Information Technology An Effective Project Essay

It is possible to avoid becoming a victim of such crimes through some basic precautionary methods. Firstly, it is essential to store or discard personal information in a careful manner. This means personal documents should not be left lying around or shared through internet. All personal information should be stored in a secure place. All sorts of old receipts, expired cards, bank statements and checks should be disposed of in an appropriate manner so that nobody can glean any sort of information by rummaging through the trash. (United States Department of Justice, 2010); (Vacca, 2002); (June, 2000) Secondly, one must be very careful about divulging personal identifying information like Social Security Number to people through the Internet or telephone. Persons impersonating bank officials may ask for essential information like passwords or account information using which identity theft can be done. Third, billing cycles must be constantly checked. In case bills do not arrive at regular intervals, it must be verified from the creditors. Fourth, use internet effectively without leaving a trail. This would involve strengthening the login security of the computer, installing a good firewall and using hard-to-break passwords. (United States Department of Justice, 2010); (Vacca, 2002); (June, 2000)

References

Baschab, John; Piot, Jon; Carr, Nicholas. (2007) "Executive's Guide to Information

Technology." Wiley.

Beard, Jon W. (1996) "Impression management and information technology."

Praeger.

Brotby, Krag. (2009) "Information Security Governance"

Wiley.

Brown, C.V; DeHayes, D.W; Hoffer, J.A; Martin,...

...

(2009).
"Managing Information Technology: (6th ed.)" Prentice Hall.

Cohen, Eli. (2005) "Issues in informing science and information technology."

Informing Science.

Cookie Central. (2010) "What are cookies?" Retrieved 19 January, 2010 from http://www.cookiecentral.com/cm002.htm

Evjen, Bill; Beres, Jason; Et Al. (2001) "Visual Basic .Net Programming Bible"

Wiley.

Henry, James. (2005) "Developing .NET Custom Controls and Designers Using C#"

BlueVision Publishing.

June, Dale L. (2000) "Protection, security, and safeguards: practical approaches and perspectives" CRC Press.

Marchewka, Jack T. (2006) "Information Technology Project Management"

Wiley.

N.A. (2005) "IT Steering Committee: Advocate or Adversary?" Insights, Retrieved 19

January, 2010 from http://www.ctghs.com/healthcare/newsletters/Insights-Steering-Committee.pdf

Schwalbe, Kathy. (2009) "Information Technology Project Management" Cengage

Learning.

Stone, Sarah. (2010) "Must-Have Non-Technical Skills for IT Pros." Retrieved 19

January, 2010 from http://www.globalknowledge.com/training/generic.asp?pageid=1840&country=United+States

Tipton, Harold F; Krause, Micki. (2008) "Information Security Management Handbook."

CRC Press.

United States Department of Justice. (2010) "Identity Theft" Retrieved 19 January, 2010

from http://www.justice.gov/criminal/fraud/websites/idtheft.html

Vacca, John R. (2002) "Identity Theft"

Prentice Hall.

Sources Used in Documents:

References

Baschab, John; Piot, Jon; Carr, Nicholas. (2007) "Executive's Guide to Information

Technology." Wiley.

Beard, Jon W. (1996) "Impression management and information technology."

Praeger.
Cookie Central. (2010) "What are cookies?" Retrieved 19 January, 2010 from http://www.cookiecentral.com/cm002.htm
January, 2010 from http://www.ctghs.com/healthcare/newsletters/Insights-Steering-Committee.pdf
January, 2010 from http://www.globalknowledge.com/training/generic.asp?pageid=1840&country=United+States
from http://www.justice.gov/criminal/fraud/websites/idtheft.html


Cite this Document:

"Information Technology An Effective Project" (2010, January 21) Retrieved April 25, 2024, from
https://www.paperdue.com/essay/information-technology-an-effective-project-15653

"Information Technology An Effective Project" 21 January 2010. Web.25 April. 2024. <
https://www.paperdue.com/essay/information-technology-an-effective-project-15653>

"Information Technology An Effective Project", 21 January 2010, Accessed.25 April. 2024,
https://www.paperdue.com/essay/information-technology-an-effective-project-15653

Related Documents

The first time that they attempted to build this system they did not follow the life cycle plan and the system ended up failing. Developing a new claims payment system that will talk to and be user friendly with the customer service management system would help to speed up efficiency and enhance quality of all departments within the organization. This streamlining would help the company as a whole to

Project Management, Sustainability and Whole Lifecycle Thinking ITT Project Management - Sustainability and Whole Lifecycle Thinking Although the sustainability movement has been advocated predominately in response to the irresponsible expansion of inefficient infrastructure by industrialized nations, with the United States and Japan now making significant efforts to embrace "green" growth practices, a growing movement has emerged that promoting sustainability throughout developing nations presents the most productive path. Even as the most modernized

Information Technology System Projects Fail Information system projects mostly end up in a failure. Along with inherent factors such as technical issues delaying implementation and indefinable expectations of customers, inappropriate budgeting and opposition to business process reengineering also makes the project go up in smoke. (Scott and Vessey, 2002) The first step towards a project's success is its objectives which should be specific, measurable and realistic. Researchers have previously emphasized

Technology and Project Management The Politics of Technology Technology today is such an integrated part of life that it has become inseparable from everyday activity. Indeed, it affects all areas of life, including general public life, professional life, schooling, and politics. In this regard, Cohen (2003) mentions that technology, when combined with politics, could become something of a double-edged sword. Terrorism, for example, could become particularly sophisticated. Enemies of the country, for example,

Migrate off of any individualized content management systems and processes not integrated to a single portal platform for greater cost and time savings in administration. Olson (32) provides an excellent case study on how universities are making use of open source portal applications to alleviate redundant and often conflicting data in multiple portals on an IBM WebSphere platform Define and build out a portal development plan that encompasses all shared processes

Technology and Project Management There has been steady development in technology over recent years and this does not look as if it is going to stop any time soon. Technology is still advancing and organizations are incorporating what technology has to offer. This helps them remain relevant and efficient in their activities. Project mangers have a major role to play when it comes to the life cycle of a project. Technology