Harsha dis 3 635


Q1. For a long time, organizations have viewed their information systems as proprietary. This means that they developed systems in house running on their own hardware. In other words, managing IT meant managing both the systems and the underlying infrastructure. Over time, as they developed and maintained various systems, the underlying infrastructure became a mix of sometimes incompatible systems that are dispersed throughout various organizational units.

Organizations have begun to recognize the need to simplify infrastructure focusing on common platforms. One approach is the “Software as Service” model where organizations buy services such as order processing or customer management rather than developing systems in house. This is often considered part of what has been termed “Cloud Computing”.

How do software services and cloud computing change the way that organizations view their IT infrastructure and IT investments?

Ref: 

https://web-s-ebscohost-com.proxy.ulib.csuohio.edu/ehost/detail/detail?vid=0&sid=f214ca10-6d7c-4ccd-a047-98e776726243%40redis&bdata=JnNpdGU9ZWhvc3QtbGl2ZQ%3d%3d#AN=53382596&db=bth

https://web-s-ebscohost-com.proxy.ulib.csuohio.edu/ehost/detail/detail?vid=0&sid=0c16087f-e41a-4fb1-82b9-b4a9e50255b2%40redis&bdata=JnNpdGU9ZWhvc3QtbGl2ZQ%3d%3d#AN=151036152&db=bth

https://web-s-ebscohost-com.proxy.ulib.csuohio.edu/ehost/detail/detail?vid=0&sid=a404c23c-ac19-46d6-88c8-a4f0e1475d3b%40redis&bdata=JnNpdGU9ZWhvc3QtbGl2ZQ%3d%3d#AN=61052892&db=bth

https://web-p-ebscohost-com.proxy.ulib.csuohio.edu/ehost/detail/detail?vid=0&sid=55a8accc-5057-4303-a5fd-4e1af20ea485%40redis&bdata=JnNpdGU9ZWhvc3QtbGl2ZQ%3d%3d#AN=112265459&db=bth

https://www.researchgate.net/publication/309285232_The_Role_and_Value_of_a_Cloud_Service_Partner

Q2. IT Security and Risk

Some of this week’s readings deal with risk and security.  These are topics that are extremely important and have been widely discussed with the recent news of security breaches at Marriott and other companies (it’s almost getting too many to keep track of).

Are companies taking IT security seriously enough?  Why or why not?