Tuesday, May 5, 2020

Information System Project Management Professional Management

Question: Discuss about the Information System Project Management for Professional Management. Answer: Introduction The digital era in day to day life of common people is stepping with rapid speed and professionally as well. With the introduction of the digital process, the major aspects related to techniques are also improving gradually. But on the other hand with the increase in technology, the risk related to confidentiality, integrity and maintenance of data is also keep on increasing. To avoid this risk and to manage the process of preservation of data, it is essential that the risk assessment techniques should be adapted in the appropriate manner. By this, the risk related to data preservation can be managed and identified effectively. Apart from this, the control and management of data preservation is also essential, because in this periodic transfer of data can be done from one location to another. Thus, in this process hardware and software installation also matters a lot. This report is mainly helpful in covering the major aspects related to the research, risk assessment, communication r isk and suitable recommendations (University of Glasgow, 2016). Research The research is considered as the most innovative part of any report. To manage the detailed content and to identify the major perspectives, it is essential that the research work should be strong and strengthned. The literature review is identified as the most suitable method for providing the appropriate feedback to the organization as well as for managing the risk assessment. The different research work is not only helpful in providing the appropriate result, but by this the actual results related to the process can be obtained properly. According to the article defined by Sally Vermateen and Brian Lavoie, the appropriate model is planned for defining SPOT model in which the risk assessment is planned for future perspectives by this model. The author defines that the SPOT model is helpful in the preservation of data, development of component strategy, assessment of risk and introduction of modular approach towards development (Vermaaten, Lavoie, Caplan, 2012). Apart from this, by this model internal as well as external risk assessment can be done in a suitable manner. By choosing these options, the developmental aspects related to an organization would become more developed and appropriate. Through this paper, the author also defines the methods, procedures and theories for the development and modification of the organization in an appropriate manner. Another paper is identified from the group of five authors who are directly and indirectly responsible for generating their personal views on the particular topic. According to these five authors, various aspects related to risk assessment are demonstrated. The impact of different factors on risk assessment is trying to be recognized. By this research paper, the author also displays the risk associated with general file format and risk associated with the data file format is also identified on the initial level (Lawrence, Kehoe, Rieger, Walters, Kenney, 2000). In this contrast to access the data and to format the particular data; software development, suitable installment of public FTP guidelines and suitable internet aspects are shown with the help of this information and data provided. In short, the data preservation considers as the most innovative step in introducing the concept of securing the data in a better and more appropriate format. In the article which is related to techniques are correlated to the preservation and saving the data in an appropriate manner. It is defined that the preservation of data can be done only with the help of major techniques, such as safely migration of data and usage of bit stream technique for securing the data. Out of all these, the most appropriate method is the hidden data to maintain the dignity and consistency of data on the wider level. In this article, the working strategy of individual process is identified in proper manner and through these techniques, the suitable results have been tried to originate (Dappert Enders, 2010). The emulation and data processing is also identified as the process in which the data emulation and processing of the unique process can be maintained at initial level. The techniques related to sustainability and management aspects of data preservation are also defined with the help of migration of data techniques. The final article which is selected for the discussion is related to most appropriate and stable model selected for the preservation of data. This model is identified as the Open Archival Information System (OAIS) (Sawyer, 2014). The authors have provided the most appropriate approach to identify the existing process and by this process, the introduction of new concept can be identified in the proper manner. In this article cum research paper, the archiving of current data is shown in a suitable manner. The model not only provides the security aspects, but also provides various alternatives for the improvement of the current aspects defined in the organization. By identifying all these aspects and understanding the suitable literature review, the actual status of the data preservation is cleared and become accurate. By these aspects, the various thoughts and innovative approach of researchers can be identified on appropriate level. The further paragraphs are helpful in defining the communication, risk and recommendations related to the data preservation technique (ICPSR, Institute, Center, 2011). Risk Assessment The risk assessment is identified as the process in which the identification of the risk can be done on a wide level. To manage risk and to identify the major causes related to risk, it is essential to prepare a strategic plan to approach risk in a proper manner. Before performing the task related to risk assessment, it is essential to identify the digital preservation threats which are identified. There are two types of threats that are identified in a large scale. These threats are threats to archive digital content and threats to custodial threats itself. To manage the risk assessment on a wide level, there is still need of light weight and framed model by which an assessment of risk can be done on an appropriate level (Lavoie, 2012). To perform suitable risk assessment for the preservation of data, various researchers propounded their different views related to risk assessment and also provided their different approaches on the risk assessment. Some of them have thought that risk assessment is helpful in painting basic perspectives related to assessment of risk and others developed the thought that risk assessment will be result oriented, when operated with different type of situation for the data preservation (Canteiro Barateiro, 2011). The identification and support of SPOT model will be more result oriented in case of risk assessment related to data preservation. The SPOT model which is commonly identified as the simple property oriented threat is mainly helpful in solving the issues related to the external and internal threats. The six essentials are identified in the SPOT models which simultaneously coordinated to manage risk in an appropriate way (ENISA, 2009). These major essentials are available, persistence, suitable existence, identification of suitable understanding and appropriate authenticity in processing of aspects. By following this concept of essential elements in an organization, the major improvement aspects can be identified easily. The SPOT model is also based on the generation of suitable outcomes in which, the evaluation of own risk and mitigation strategies are being identified on the initial level. Another method is the preservation of metadata for managing risk and maintaining the appropriate criteria for the suitable evaluation in a right manner. In Meta data, the information is transferred from one location to another. The individual files cannot be carried from one location to another so for this, it is essential to carry the multiple files or the interrelated files also. If these interrelated files will not travel with one another, then data transfer will not be completed and current files wont be considered of any importance. The execution of Meta data can be managed in the digital format and by this, the security chances can be lost easily. So, the assessment of risk on this level is also essential to be identified and managed in a proper manner. With the help of the migration analysis method, the risk assessment related to the aspect can be studied in a very approached and attractive manner. In the migration analysis method, the data is transferred from one location to another location in a most approached way (HSE Team, 2014). The risk occurs at that time only. For removing the risk, the strategic risk management scheme needs to be planned. In this type of assessment, three aspects are identified. These aspects are known as risk associated with collection of general material, risk related to general file format and one of the innovative aspects is the risk related to the file format conversion process. By identifying all these risk aspects on the migration analysis perspectives, the major risk can be solved easily. The threat models are also identified as the practical tools which are used repositories to identify the risk assessment. The repository factor is also helpful in identifying the re- development of the component, policies and procedures on a wide level. Apart from these processes, there are other process too which are helpful in identifying the major risk factors and also helps in assessment of risk in broader form. The risk assessment is also considered as an area for the discussion because by accessing the risk, the measurement aspects can easily be identified and the better solutions or alternatives can be generated on a large scale. Communication Risk Communication risk is identified as the factor in which the major risk related to existing system got identified. In this section, the outlining of major risk can be performed in an appropriate direction. The major risks which are related to the data preservation are identified as archiving and retention of data. Both these aspects are considered on the wide level and the identification of these issues is also very tough to identify. In the communication risk apart from these issues, other issues can also be included which are defined above in the paragraphs. Various organizations dont want to secure or save the data. Due to this, they have to face loss of data and various crises also arises in the organization. To manage the preservation of data and to manage archiving of particular data, suitable processes are adapted to manage the risk. With the development in the changing aspects, the technology and its perspectives are also changing with the rapid rate. With the change in technique, the ways of communication are also changing due to which, risk of communication may also increase simultaneously. While doing communication, the chances of data loss, integrity of data and hindrance in the growth of data occurs commonly. To avoid this situation and to maintain the dignity of data, various steps are identified which are helpful in improving the existing condition of the data preservation in all the possible conditions. Apart from archiving and retention, there are various other communication risks that are identified on the wide level. These are related to the faulted vendors who are mainly on fault due to sending and transferring unauthorized data from one vendor to other, legal faults and the faults of management people, due to which the communication risks are becoming very common. Facing the issues and managing them in a patience manner is essential. To manage the communication risk for preservation of data, it is essential to manage some of the perspectives like management of records, identification of appropriate methods to overcome archiving and retention and many other processes defined on the large scale. By following the basic recommendations and precautions, data preservation issue can be solved in a better way. Recommendation By assuming all the perspectives and identifications, it is clearly identified that the specific theories are identified for the improvement of digital data preservation. In the above discussion, there are various theories and concepts introduced to reach the target, but simultaneously the strong strategic approach is required for an improvement. The most appropriate aspects for an improvement of the existing structure are the clarity in concept, detailing in the aspects and the appropriate management of process, proper comprehensiveness and transparency in the existing structure. By this, the suitable preservation of data can become possible on a major level. Apart from this, the Commission on Preservation and Access (CPA) and Research Libraries Group (RLG) defines various norms and policies by which, the management of digital data can be done on a wide level and periodic transfer of digital material in an appropriate manner will be helpful in doing a suitable execution in the well-organized manner. Some of the guidelines that are defined by CPA and RLG in joint venture are defined below: - It is recommended by the authorities that transfer of data and information should be carried out in the right direction or in a confidential format. By this, the confidentiality of data will be ruined so, data transfer preservation can be done in an encrypted format (Team, 2009). The digital files should be refreshed on the routine level. This will be helpful in reducing the risk at large extent and the purpose of digital data preservation can be solved at the core level. The change in the digital formats and the conversion of existing format in the other form is also identified as the suitable method of transferring file from one location to another. For an example, the conversion of one file to the different format like ASCII and many other formats on initial level. The suitable format is also identified for migrating the data from one location to another. The safe migration of data is identified as the key aspect for an improvement and development of a risk assessment plan or data preservation The software also possesses major role in maintaining data observation in completing the suitable process. With the help of software, the transfer of data from one location to another is essential to carried (University College London, 2016). Apart from these recommendations, the intellectual foundation steps are also considered on priority. By adapting these steps, various aspects can be solved on the wide level and the issues related to the preservation of data may get easier. These steps are identified as preserving the digital information on the initial level, installation of OAIS model for solving the purpose of major issues, identification of repository models so that the major issues can be solved and identification of inter Pares which is helpful in coordinating manner to manage issue related to the digital preservation. By adapting all these major recommendations and improvement processes, the processing of management and maintenance of data preservation can become possible. The modifications in the recommendations are also required along with the defined process. This will generate the suitable output as per the requirement. References Canteiro, S., Barateiro, J. (2011, November 04). Risk Assessment in Digital Preservation of e-Science Data and Processes. Risk Assessment in Digital Preservation of e-Science Data and Processes. Retrieved from https://www.timbusproject.net/resources/publications/articles/71-risk-assessment-in-digital-preservation-of-e-science-data-and-processes Dappert, A., Enders, M. (2010). Special issue: Digital preservation. NISO. Retrieved from https://www.loc.gov/standards/premis/FE_Dappert_Enders_MetadataStds_isqv22no2.pdf ENISA. (2009, November). Inventory of Risk Management / Risk Assessment Methods and Tools. Inventory of Risk Management / Risk Assessment Methods and Tools. Retrieved from https://www.enisa.europa.eu/topics/threat-risk-management/risk-management/current-risk/risk-management-inventory HSE Team. (2014). Risk assessment: A brief guide to controlling risks in the workplace. HSE. Retrieved from https://www.hse.gov.uk/pUbns/indg163.pdf ICPSR, Institute, T. O., Center, T. R. (2011). Data Preservation Alliance for the Social Sciences. Harvard University. Retrieved from https://www.digitalpreservation.gov/partners/documents/Data-PASS_NDIIPP_Final_Report.pdf Lavoie, B. (2012). Preservation metadata as an evidence base for risk assessment. OCLC. Retrieved from https://www.oclc.org/content/dam/research/events/2012/10-02e.pdf Lawrence, G., Kehoe, W., Rieger, O., Walters, W., Kenney, A. (2000). Risk Management of Digital Information: A File Format Investigation. Council on Library and Information Resources. Retrieved from https://www.clir.org/pubs/reports/pub93/pub93.pdf Sawyer, D. (2014). The Open Archival Information System and the NSSDC. The Open Archival Information System and the NSSDC. Retrieved from https://nssdc.gsfc.nasa.gov/nssdc_news/dec00/oais.html Team, I. (2009). Principles and Good Practice for Preserving Data. Interuniversity Consortium for Political and Social Research (ICPSR). Retrieved from https://www.ihsn.org/home/sites/default/files/resources/IHSN-WP003.pdf University College London. (2016). Research Data Management: best practices. Research Data Management: best practices. University of Glasgow. (2016). Preservation issues. Retrieved from https://handbook.dpconline.org: https://handbook.dpconline.org/digital-preservation/preservation-issues Vermaaten, S., Lavoie, B., Caplan, P. (2012, October). Identifying Threats to Successful Digital Preservation: the SPOT Model for Risk Assessment. Identifying Threats to Successful Digital Preservation: the SPOT Model for Risk Assessment, 18(10). Retrieved from https://www.dlib.org/dlib/september12/vermaaten/09vermaaten.html

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.