Monday, July 6, 2009

MIS- Reflection about Automated Election

Your thoughts on automated elections with reference to the current situation ... (1000 words)

Now days, technologies are very important to us people. These existing materials give us a gratification and satisfaction for our daily urgencies in everyday life.

As a correlation to this, regarding with the process of election last 2006, it causes such hustles, troubles and issues because of the lack assessments and some election frauds of the voters profile that brought many negative feedbacks about the voting results.

In addition, there are some possibilities of having an issue to manipulate peoples vote during election. From those who have the power or the capability considering that they are in the high position in office.

And for this coming election the government wanted to implement the new process of electoral system with the use and application of the highly evolve technologies. In consideration for the fast and well organize voting process.

This new proposed electoral system is precisely known as “Automated Election”. An Automated election system is type of a system that using appropriate technology for voting and electronic devices to count votes and canvass/consolidate results. The question now is, How secured the comelec voting system that they urge to use the automated election this 2010? I think the system can be hacked and manipulate the results by the computer experts. If the National Security systems of U.S have millions of attempts to hacked and control their system, how much more here in the Philippines.

There are also advantages and disadvantages of implementing the automated system for election. It provides efficient way for voting with less hassle. Voters cannot prolong the process of voting and lined up in a crowd. But a thought came across my mind. This could be the cause to worsen political situation. Possibilities for the candidates can hire a computer experts to hack the system and manipulate the entire votes. Unless if the system is fully secured.

But on the other hand, this new electoral system can also be cheated and deceit. We can’t be sure that about the confidentiality and security of our votes, so that we us a voter will can assure for the proper and official results of our votes without any doubt and suspicions about any foolish exploitation of our votes . Considering to the fact that this process of election can also be cheated and manipulate by others that is very disparate to win in for an office position.

By these views, I, as a student and to vote nationally for the first time, can state that whether it is manual or Automated election, the coming election will end up properly and fairly, if the existence of many election frauds will desist and hinder.

HRM- Prefer IT_Job in the future

Don’t dream it, be it…..! Aim high Usepian…

From the start, I never decided yet what am I desired to be in a profession or what kind of a job I should pursue that suits to my knowledge, capability and competence as an IT student. But since then, I had realize a millions of opportunities waiting for me in the near future and as an advantage, I can be one of the next products of USEP’s globally competitive students and proficient professionals.

An individual with power of mine and competence to govern the technological world today. There are many offered job opportunities for in Information Technology graduate. Such as, IT Specialist (System & Software Analyst) , I.T. Service Management Consultant, Project Manager (infrastructure project) , Network & Systems Administrator, Systems Administrator (remote infrastructure), Database and Network Administrator (Training and Consulting Group-TB LINC Program), IT/SYSTEMS Administrator and etc,. But my choice is, I want to an IT Manager someday. Because as manager, it sounds like you’re the head and a president in a company. Very nice to hear, right?!

An Information technology (IT) manager should plan, administer and review the acquisition, development, maintenance and use of computer and telecommunications systems within organizations. The IT manager is often the most senior person in the IT department and in large organizations may be called the IT Director or Chief Information Officer.

The following links are some Duties and tasks that an IT Manager should perform:

  • work out current and future IT needs by consulting with people at all levels about the current work systems and deciding how improvements could be made
  • analyze the information needs of an organization and develop technological solutions to satisfy those needs
  • prepare or direct IT policy and plan strategy development
  • direct activities to select and install major IT facilities
  • oversee the provision of training for users and clients
  • direct the integration of IT operations, computer hardware, operating systems, communications, software applications and data processing
  • work out priorities for systems developments, maintenance and operations
  • control the security aspects of IT systems
  • Provide advice to other senior managers and boards on IT issues and planning.

Remarks:

The best changes often start as a single, simple thought. Think big, and discover the ways to make your dreams real. With all my strength, courage, and confidence in every experience in which I really stop to look fear in many faces. I must do the things in which I think can do.

MIS- Best practices

Best Practices:

NCCC as a huge company and provides a large merchandising of products that may also help to up-lift the economic stability of the country today and in the vicinity of future. It is not quite easy to handle simultaneously the assets, production and distribution of the products widely.

Now, to manage contiguously and properly the systems. The management had propose the following best practices as a standard principles provided for the management security, affectivity and efficiency.

List of the Best practices amended:

*PROPER DOCUMENTATION

Proposal of legal papers that sight the objectives and goals for the possible changes that may help for the management progress and expansion. This also serves as evidence in any manipulations undergone by the management.

*PROCEDURES/STEPS

Same as with other methods and process. The NCCC adopt effective procedures before even pursuing an act upon.

Examples:

*Hosting Service

-website of NCCC hosted outside.

*Point of Sales (POS)

-acquires efficient distribution. This should be presented by a legalized documentation.

*Changes in OS application

*Upgrading of System, information and devices.

*POLOCIES

Same as trough with proceedings of any action, there are policies amended within the management to secure its volubility, sales confidentiality and efficiency.

These are some of the common practices that the NCCC management had espoused and apply in every sanction and decisions that the management should face and handle.

Interview NCCC- HD Supervisor:

Mr. Hervin Piklat

MIS- What do you think are the risks associated with buiseness and it/is change?.

Behind the NCCC's success as one of the leading company in the country. We can't deny that it has a must effective Management Information System, when it comes to business efficiency and services.

Now, let me share to you some important facts and details I'd gather from the interview we had conduct last July 4,2009 (Saturday) among with my co-IT students to Mr. Hervin Piklat, the NCCC- Hardware Security Supervisor.

Regarding with the question, What do you think are the risks associated with business and IT/IS change?.

The following are some of the important discussions and explanations of Mr. Hervin Piklat.

According to Sir Hervin:

“In everything we do and to pursue our goals, the case is not actually a risks but a challenge in our management”.

In defend, Sir Hervin sight an specific examples of situations.

Example 1: Why our company has an Merchandise Management System (MMS)?.

At the start, NCCC only issue a manual receipt ti the customers. Now, pertaining to a situation that there are two competitors with the same sales and same price of products. Now, if am the customer, of course i must prefer to choose the one with fast accommodation of services compared to the other.

Risk Involve:

In that situation, the management will plan for the suitable system that can be applicable for the business proficiency.

Example 2: OS of the Management.

Comparing to the 2000 Os and 2008 OS application, of course the 2008 OS is much better to apply that the 2000 OS, because it's more advance, efficient and have many new features than the 2000 OS.

Risk Involve:

If the Management may not adopt the 2008 OS, it may lead to a possible new features that the Management will not make. If this is the case, the competency of the NCCC may lessen compared to it's other business competitors.

Example 3: Firewall

The situation is comparing the old to the latest firewall. A firewall have an Unified Technology System (UTM).

Risk Involve:

If the company will decide to change the UTM?

The first thing that the management should priorities is to upgrade their systems information because if not, it may cause restrictions to the system's security.

NOTE:

In every IT change there is a risk involve”.

With these examples, Sir Hervin added that before any risks and decisions to pursue the management should make first a business case study and analysis to determine the most profitable ways and steps in business plans and changes.