3 - Organization: Technology Management (From Study Group) Flashcards
“Big Data”
Three features have changed technology requirements for organizations: volume, velocity, and variety.
Can help HR by collecting new data, using existing data more effectively, and allowing for better strategic analysis.
Information System Components
- Way to collect, organize, store, analyze, and share data.
- They feature four basic component tiers:
- Presentation
- Application
- Data
- Communications
Enterprise Resource Planning (ERP) Systems
- Designed to allow different parts of an organization to access the same data
- Designed for a generalized user’s needs
HR Information Systems (HRIS)
- Specific technology that supports HR functions
- Component of an ERP system
“Best of breed” Systems
- HR technology products designed to serve unique situations or satisfy specific preferences
- May not communicate with an organization’s database successfully
Volume
- Datasets have grown so large that new tools are required to store, access, and analyze them.
- Cloud computing services—in which data is saved to remote servers that are connected through the Internet—has become a popular way to manage increasing amounts of data.
Velocity
- Data can flow into a system so quickly that its currency becomes an issue.
- Data analysis now requires real-time or almost real-time information.
- Data must be updated frequently or continuously throughout all points in the system.
Variety
- Data is not only numbers now. It may be still images, videos, or audio recordings.
- It may be imported from social media, mobile phones, or sensors (e.g., wearable technology such as badges).
- Systems must be capable of taking in these diverse forms and integrating them for storage and access.
Presentation Tier
- User interface with the system, the point at which the user can enter requests and receive responses.
- Traditional computer monitor or a mobile device.
- Incorporate a level of security to control access.
- Adaptable to users with different physical abilities
- sight
- hearing
- physical movement
Logic Tier
- Composed of system software and application software that enable operations.
- Operating system, which runs the interface with the presentation tier (or user)
- Moves data back and forth between the data tier and software
- Manages communication with hardware components (e.g., video cards, displays, printers)
- Controls system resources.
Data Tier
- Stores the information that will be used by the application tier to respond to user queries.
- Data can be stored on local drives, removable devices, and servers.
Communication Tier
- Enables sharing of data and applications by networking a computer (or mobile device) with other computers or servers.
- Networks can be private—e.g., local area networks, privately operated clouds, or virtual private networks (VPNs).
Scalability
- How to increase the amount of data stored without increasing processing time and how to manage capacity.
- Minimizing processing time is a technical design challenge; increasing capacity is an economic challenge.
- It is difficult to build capacity for future needs without creating waste in current practices.
Addressing IS Security
- Ensure confidence in security of purchased systems and software.
- Assign appropriate user security levels.
- Implement governance policies and processes to ensure transparency.
HR Technology Applications
- Automate complex processes
- Produce data for other applications
- Support data analysis
- Support compliance-related activities
Employee Self-Service Technologies
Enable employees to enter and edit their own data
Manager Self-Service Technologies
- Enable managers to handle HR-related transactions
- Save time for everyone
Purchasing Technology
- Assess needs
- Prioritize requirements
- Identify and assess providers
- Create a business case
- Implement and assess
- Internal Needs Assessment
After identifying all stakeholders, work to assess technology needs along three main fronts:
- HR needs
- User needs
- Organization needs
- Prioritize Requirements
What will meet our needs?
- On premises or in the cloud?
- Owned, leased/licensed, subscription?
- ERP solution or BoB HRIS system?

- Research Providers
- Search and review online articles and vendor websites.
- Review analyst reports.
- Ask for recommendations from industry colleagues.
- Contact existing vendors.
- Attend HR professional meetings and technology trade shows.
- Business Case
Any major IT purchase will have to:
- Align strategically with organizational and HR objectives.
- Add valuable capabilities.
- Affect organizational risk level in an acceptable manner.
- Provide a reasonable return on investment.
Data and System Security
- Limiting logical and physical access to data/systems
- Defending against hacking and social engineering
- Encrypting data that is transmitted or stored
Social Engineering
Train users to:
- Never disclose a password to anyone.
- Not give private information to anyone they do not know.
- Click links only from trusted sources.
- Delete unsolicited e-mails.
- Assess requests and investigate if they are unusual.
Social Engineering Tactics
- Phishing
- Fake job openings
- Phony security alerts
- “Click this link” scams
General Data Protection Regulation (GDPR) Themes
- Transparency
- Individual rights of access to/ control over data
- Legality of processing
- Data quality and minimization
- Data sharing
- Data transfers
- Data breaches
- Accountability
Collaboration Policies and Approaches
Organizations have introduced communication practices designed to maintain structure while, as much as reasonably possible, allowing for natural aspects of human interaction.
Examples:
- Meeting times that can accommodate most participants
- Creating agendas with time estimates for each topic
- Providing the meeting host full control over technological tools
- Recording discussions/meetings
- Using passcodes to restrict participation to invitees
- Hierarchies of authority for access to documents
- Legal disclaimers outlining rights/responsibilities
- Balancing security and rights protection with accessibility
“Bring Your Own Device”
(BYOD)
Realistic policies allow employees to use their personal digital devices to access the organization’s network but define certain restrictions on their use.
- Restrict the use of personal devices while the employee is working in the workplace.
- State which devices will be supported by IT and the requirements for using the device.
- Clarify financial arrangements and legal rights.
- Define security measures.
Developing Social Network Policies
- Identify key risks.
- Review employee handbook for existing policies.
- Discuss risks and concerns with IT experts.
- Consult with legal counsel on compliance issues.
- Align proposed policy with organizational culture.
Social Media Policy Inclusions
- Prohibitions on use of organization’s resources
- Prohibitions on disclosing confidential information
- Situations requiring employer approval for postings
- Rules about personal endorsement of organizational products/services
- Rules for posts about colleagues
- Statement that employees will be held accountable for any violations of laws or policies