Explore BrainMass
Share

Centralized Information Technology

This content was STOLEN from BrainMass.com - View the original, and get the already-completed solution here!

What are the advantages of centralized information technology? Provide examples.

Does centralized Information Technology benefit and/or contribute to Sarbanes Oxley Compliance? If so, how? Provide examples.

© BrainMass Inc. brainmass.com October 24, 2018, 11:57 pm ad1c9bdddf
https://brainmass.com/business/business-law/advantages-of-centralized-information-technology-sarbanes-oxley-compliance-211272

Solution Preview

Advantages of Centralized Information Technology
Wisdom we have lost in knowledge?"
-R.L.Stevenson

An appendage to this could be to add, "Where is the knowledge we have lost in data?" Truly, with the explosion of IT, the amount of data at one's disposal is enormous and the challenge is now to harness the power of knowledge hidden in the collage of data.

Centralized information technology refers to the concentration of Major information technology decisions at one place. Centralization is generally an authority relationship between those in overall control of the organization and rest of the staff. The tighter the control exerted at the center, the greater the degree of centralization. The benefit of the centralization is that top managers remain fully aware of the operational as well as strategic issues and concerns.

Benefits of centralized Information Technology are:

1) It will facilitate company-wide Integrated Information System covering all functional areas like Manufacturing, Selling and distribution, Payables, Receivables, Inventory, Accounts, Human resources, Purchases etc.,
2) It will lower total costs in the complete supply chain. It helps in shortening throughput times and reducing the stock to a minimum.
3) It provides more reliable delivery dates and higher service to the customer. It helps in efficiently coordinate global demand, supply and production.
4) It improves timeliness of information by permitting, posting daily instead of monthly and in greater accuracy of information with detailed content, better presentation, fully satisfactory for the Auditors.

5) Integration with E-Commerce:
Internet enabled centralized information technology offers Internet, Intranet and Extranet solutions for business-to-business, business to consumer, employee self-service, and more. For example, one can use the Internet to allow their customers to view recent catalogs, check the status of an order, and place catalog ...

Solution Summary

This solution discusses the advantages of centralized information technology.

$2.19
See Also This Related BrainMass Solution

CIPS Codes of Ethics

Hello,

I have attached a case study below, which apparently is simple, but I do no know how to base it on CIPS codes of ethics and utilitarian rights.This is an important case study and I really need some help on it. I have attached the case study for you.

Software Copyright Case

You are the Vice-President of Information Services for a large Canadian university. As such you are responsible for all IT professionals who work for the university, and for all policies and actions concerning IT within the university. You report directly to the President. For several years, your Information Services Department has stored and made available via FTP various software programs that were either in the public domain, or were shareware, or were proprietary programs for which you held campus-wide licenses for all staff and students.

Originally these programs could only be obtained by logging on to the host machine, and as such were only available to people who had authorized accounts on that server, and were accessing it from machines within the Internet domain of the university. One year ago you authorized a change that made this software available through Web browsers. You were assured at the time that this change did not affect the security in place. The software would still only be available through machines within the university domain, and that each download would be recorded and identified to a particular individual and machine.

Yesterday the system administrator responsible for the server approached you with some concern. Due to a security loophole, anyone knowing the specific pathname and filename of any available software program could download it from any location. The administrator had heard that many students were now aware of this and had obtained their own copies of a leading software package, and possibly distributed this information about how to obtain it elsewhere. There was the possibility that large-scale theft of proprietary software had occurred.

Analyze this situation and determine what you will do. You are required to apply a systematic form of analysis to the case that considers both utilitarian and rights ethical issues, and the interests of all stake holders, as . Base your solution on the CIPS Code of Ethics and Standards of Conduct where relevant. Make and state any assumptions you consider necessary.

View Full Posting Details