Anthony Redhead
Grantham University Project Management Integration Framework (BA 647)
Introduction
As a multinational organization, Briargrove has an extensive computer system network. However, due to too many locations globally, Briargrove only thought of data back-ups and lab test network without implementing administrator accesses or an information Technology (IT) policy and procedure. Because they failed to implement Information Systems (IT) administrative controls, many of the management personnel downloaded unknown software and has caused a complete system failure, affecting negatively the entire organization’s network. Following their …show more content…
Discussed earlier, it was mentioned to give “administrator access” to some of the employees. “Administrator access” is defined as a level of access above that of a normal user. This definition is intentionally vague to allow the flexibility to accommodate varying systems and authentication mechanisms. Local Administrators, Domain Administrators and Enterprise Administrators groups would all be considered to have Administrator Access. In an application environment, users with ‘super-user’ or system administrator roles and responsibilities would be considered to have Administrator Access. In theory, this guidance applies to any user account in that utilization of access rights is reserved solely for the intended business purpose that would be granted solely by Briargrove’s Administration.
IT policies and procedures in any organization provides a framework for appropriate and inappropriate use of computing and information resources (Winniford, et al, 2012). More specifically, the organization would have in writing that using a computer system without proper authorization granted through Briargrove’s Administration would have adverse actions on their …show more content…
C., Zmud, R. W., Jacobs, G. C. (1994). “The influence of IT management
Practice on IT Use in Large Organizations.” MIS Quarterly. Retrieved from http://web.b.ebscohost.com/ehost/pdfviewer/pdfviewer?vid=8&sid=9ee19d25-76f7-4b70-87bd-7bf868116023%40sessionmgr198&hid=115.
Jiang, J. J., Chang, J. Y. T., Chen, H., Wang, E. T., and Klein, G. (2014). “Achieving IT
Program Goals with Integrative Conflict Management.” Journal of Management Information Systems. Retrieved from http://web.b.ebscohost.com/ehost/pdfviewer/ pdfviewer?vid=6 &sid=9ee19d25-76f7-4b70-87bd-7bf868116023%40 sessionmgr198&hid=115. Winniford, M., Conger, S., Erickson-Harris, L. (2012). “Confusion in the Ranks: IT
Service Management Practice and Terminology.” Information Systems Management. Retrieved from http://web.b.ebscohost.com/ehost/pdfviewer/
pdfviewer?vid=10&sid=9ee19d25-76f7-4b70-87bd7bf868116023%40sessionmgr