Chapter 9 and 10
Chapter 9 and 10
Chapter 9 and 10
• E-strategy typically aligns with the broader organizational strategy and aims to
leverage technology effectively to gain a competitive advantage in the digital
marketplace.
Definition of Information Policy and e-strategy
• Effective e-strategy implementation requires considerations of information
policy to address issues such as data privacy, security, and intellectual
property rights.
• Both concepts are interdependent and play a crucial role in the effective and
ethical utilization of information resources in the digital age.
Goals of Information Policy
• Data Security: Ensuring the confidentiality, integrity, and availability of sensitive
information.
• Risk Management: Identifying and mitigating risks associated with data breaches,
cybersecurity threats, data loss, and other vulnerabilities
• Data Governance, Business Continuity and Disaster Recovery and Alignment with Business Objectives
ICT policy development
• ICT (Information and Communication Technology) policy development involves the
creation of guidelines, principles, and regulations to govern the use,
management, and deployment of technology within an organization or a broader
context, such as a government or society.
• Identify Objectives and Scope: By considering the organization's goals, needs, and
strategic priorities. Determine the scope of the policy, including the technologies,
systems, and stakeholders it will cover.
• Implementation Plan: Develop a detailed implementation plan that outlines the steps,
resources, and timelines for rolling out the ICT policy. Identify responsible parties,
establish accountability mechanisms, and allocate sufficient resources for
implementation.
• Monitoring and Evaluation: Establish mechanisms for monitoring and evaluating the
effectiveness of the ICT policy over time. / Define key performance indicators
• Review and Revision: Periodically review and revise the ICT policy to reflect changes in
technology, business needs, regulatory requirements, and emerging threats
Levels of Information Policy
• Information policy can be developed and implemented at various levels within
an organization or a broader context. Here are the common levels of
information policy:
• Innovation: Support for research and data analysis drives product and service
development.
Impact of Information systems
• Transparency: Access to relevant information builds trust and accountability.
• E-business applications face risks such as data breaches, hacking, malware, phishing, and
denial-of-service attacks.
• Encryption: Implementing strong encryption protocols to protect data both in transit and
at rest.
• Regular Updates: Keeping software and systems updated with the latest security patches
to address vulnerabilities./Stay updated on the latest security threats and trends
Security concerns and security management strategies in e-business applications
• Firewalls: Deploying firewalls to monitor and control incoming and outgoing network
traffic.
• Security Audits: Conducting regular security audits and penetration testing to identify
and address security weaknesses.
• Regular risk assessments to identify potential security threats and vulnerabilities. This
includes both physical and cybersecurity risks.
• Make employees to understand their role in maintaining security and mitigating potential
security threats
Security concerns and security management strategies in e-business applications
• Data Backup and Recovery: Implementing robust data backup and recovery
procedures to ensure business continuity in the event of a security breach or
data loss.