3 - Organization: Technology Management (From Study Group) Flashcards

1
Q

“Big Data”

A

Three features have changed technology requirements for organizations: volume, velocity, and variety.

Can help HR by collecting new data, using existing data more effectively, and allowing for better strategic analysis.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Information System Components

A
  • Way to collect, organize, store, analyze, and share data.
  • They feature four basic component tiers:
    • Presentation
    • Application
    • Data
    • Communications
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Enterprise Resource Planning (ERP) Systems

A
  • Designed to allow different parts of an organization to access the same data
  • Designed for a generalized user’s needs
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

HR Information Systems (HRIS)

A
  • Specific technology that supports HR functions
  • Component of an ERP system
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

“Best of breed” Systems

A
  • HR technology products designed to serve unique situations or satisfy specific preferences
  • May not communicate with an organization’s database successfully
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Volume

A
  • Datasets have grown so large that new tools are required to store, access, and analyze them.
  • Cloud computing services—in which data is saved to remote servers that are connected through the Internet—has become a popular way to manage increasing amounts of data.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Velocity

A
  • Data can flow into a system so quickly that its currency becomes an issue.
  • Data analysis now requires real-time or almost real-time information.
  • Data must be updated frequently or continuously throughout all points in the system.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Variety

A
  • Data is not only numbers now. It may be still images, videos, or audio recordings.
  • It may be imported from social media, mobile phones, or sensors (e.g., wearable technology such as badges).
  • Systems must be capable of taking in these diverse forms and integrating them for storage and access.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Presentation Tier

A
  • User interface with the system, the point at which the user can enter requests and receive responses.
  • Traditional computer monitor or a mobile device.
  • Incorporate a level of security to control access.
  • Adaptable to users with different physical abilities
    • sight
    • hearing
    • physical movement
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Logic Tier

A
  • Composed of system software and application software that enable operations.
  • Operating system, which runs the interface with the presentation tier (or user)
  • Moves data back and forth between the data tier and software
  • Manages communication with hardware components (e.g., video cards, displays, printers)
  • Controls system resources.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Data Tier

A
  • Stores the information that will be used by the application tier to respond to user queries.
  • Data can be stored on local drives, removable devices, and servers.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Communication Tier

A
  • Enables sharing of data and applications by networking a computer (or mobile device) with other computers or servers.
  • Networks can be private—e.g., local area networks, privately operated clouds, or virtual private networks (VPNs).
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Scalability

A
  • How to increase the amount of data stored without increasing processing time and how to manage capacity.
  • Minimizing processing time is a technical design challenge; increasing capacity is an economic challenge.
  • It is difficult to build capacity for future needs without creating waste in current practices.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Addressing IS Security

A
  • Ensure confidence in security of purchased systems and software.
  • Assign appropriate user security levels.
  • Implement governance policies and processes to ensure transparency.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

HR Technology Applications

A
  • Automate complex processes
  • Produce data for other applications
  • Support data analysis
  • Support compliance-related activities
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Employee Self-Service Technologies

A

Enable employees to enter and edit their own data

17
Q

Manager Self-Service Technologies

A
  • Enable managers to handle HR-related transactions
  • Save time for everyone
18
Q

Purchasing Technology

A
  1. Assess needs
  2. Prioritize requirements
  3. Identify and assess providers
  4. Create a business case
  5. Implement and assess
19
Q
  1. Internal Needs Assessment
A

After identifying all stakeholders, work to assess technology needs along three main fronts:

  1. HR needs
  2. User needs
  3. Organization needs
20
Q
  1. Prioritize Requirements
A

What will meet our needs?

  • On premises or in the cloud?
  • Owned, leased/licensed, subscription?
  • ERP solution or BoB HRIS system?
21
Q
  1. Research Providers
A
  • Search and review online articles and vendor websites.
  • Review analyst reports.
  • Ask for recommendations from industry colleagues.
  • Contact existing vendors.
  • Attend HR professional meetings and technology trade shows.
22
Q
  1. Business Case
A

Any major IT purchase will have to:

  • Align strategically with organizational and HR objectives.
  • Add valuable capabilities.
  • Affect organizational risk level in an acceptable manner.
  • Provide a reasonable return on investment.
23
Q

Data and System Security

A
  • Limiting logical and physical access to data/systems
  • Defending against hacking and social engineering
  • Encrypting data that is transmitted or stored
24
Q

Social Engineering

A

Train users to:

  • Never disclose a password to anyone.
  • Not give private information to anyone they do not know.
  • Click links only from trusted sources.
  • Delete unsolicited e-mails.
  • Assess requests and investigate if they are unusual.
25
Q

Social Engineering Tactics

A
  • Phishing
  • Fake job openings
  • Phony security alerts
  • “Click this link” scams
26
Q

General Data Protection Regulation (GDPR) Themes

A
  • Transparency
  • Individual rights of access to/ control over data
  • Legality of processing
  • Data quality and minimization
  • Data sharing
  • Data transfers
  • Data breaches
  • Accountability
27
Q

Collaboration Policies and Approaches

A

Organizations have introduced communication practices designed to maintain structure while, as much as reasonably possible, allowing for natural aspects of human interaction.

Examples:

  • Meeting times that can accommodate most participants
  • Creating agendas with time estimates for each topic
  • Providing the meeting host full control over technological tools
  • Recording discussions/meetings
  • Using passcodes to restrict participation to invitees
  • Hierarchies of authority for access to documents
  • Legal disclaimers outlining rights/responsibilities
  • Balancing security and rights protection with accessibility
28
Q

“Bring Your Own Device”

(BYOD)

A

Realistic policies allow employees to use their personal digital devices to access the organization’s network but define certain restrictions on their use.

  • Restrict the use of personal devices while the employee is working in the workplace.
  • State which devices will be supported by IT and the requirements for using the device.
  • Clarify financial arrangements and legal rights.
  • Define security measures.
29
Q

Developing Social Network Policies

A
  • Identify key risks.
  • Review employee handbook for existing policies.
  • Discuss risks and concerns with IT experts.
  • Consult with legal counsel on compliance issues.
  • Align proposed policy with organizational culture.
30
Q

Social Media Policy Inclusions

A
  • Prohibitions on use of organization’s resources
  • Prohibitions on disclosing confidential information
  • Situations requiring employer approval for postings
  • Rules about personal endorsement of organizational products/services
  • Rules for posts about colleagues
  • Statement that employees will be held accountable for any violations of laws or policies