Tuesday, May 5, 2020

Professional Communication Skills for ICT

Question: Discuss about the Professional Communication Skills for ICT. Answer: Introduction The report is about analyzing the ICT Information Security Policy and Management of the University of Southern Queensland. The University uses various processes of ICT that are used in various processes of internal governance, external party governance, human resource management, asset management, operations and communication management, assess management, system acquisition, incident management, business continuity management, compliance management, etc. Analysis of the ICT communication model and different communication model used in the process will be described in the report by highlighting the effectiveness of the message, evaluation of the document, evaluation of the sources, and the breakdown of the arguments are properly analyzed under the body of the report. Apart from that recommendations will be provided regarding the effectiveness of the strategies used by the University in the practice of various ICT in the information management and security systems. it is seen that ICT is a common aspect that is used by most of the organizations in order to compete the rival companies of the competitive business world. While analyzing the document, secondary research methods are used for providing suitable recommendations. Evaluation of communication model In the document, it is seen that the organization is using ICT in its every department of operation. However, it can be said that the operations department uses communication models such as electronic mail, supplied communications methods, etc. when the employees are communicated with the various officers related with the University business regarding the use of ICT in various aspects of operations (Solar et al. 2013). Information are exchanged within and outside the university through using online services such as NTSAF and QGISCF. Transactions of different aspects are occurred through various modes of online transactions. However, it can be seen that the different communication models are not updated or effective in order to receive prompt feedback from the people associated with the use of ICT in the department. Other models of communications can be included in the operations of ICT in the University. While improving the business, a business reminder will be set along with SMS to the particular people or a group whenever required for business purpose (Rice and Leonardi 2013). Evaluation of the effectiveness of message The organization is committed to manage all possible risks that will be associated with the ICT and assets and information system while reducing the rate of ICT security incidents. Usage of ICT and Information security in the University requires an effective goal. However, the policy statement illustrates the governance a framework for protecting the Information management and security within the dimension of organization (Yuan et al. 2013). The goal of using these approaches of ICT in the internal and external operations of the University is to improve the pace of the business operations i.e. increasing the effectiveness of the employees associated with it. The message of the communication is based on five elements such as responsible use, availability, integrity, confidentiality and responsible use of the resources of ICT. However, there are opportunities of improving the effectiveness of the use of the model. The effectiveness of the message of the goals of using ICT will be more effective if the level of communication increases among the various levels of employees present in the organization. It can be increased by many methods (Hislop 2013). Evaluation of the document The document that is formulated for creating an awareness of the different types of ICT and Information management and security systems used in the different operational departments of the University in order to increase the effectiveness of the work of the employees of the organization. The document is categorized into different parts such as purpose, scope and principles. Apart from that, various links are provided in the reference list that will direct the viewers to go the direct website for detailed description (Diniz et al. 2012). Different methods of ICT are used in the various departments of the organization are mentioned in the document. However, the document lacks the clarity of the goals and strategies used in each department mentioned in the document. It is recommended that in each of the principle discussed in the study, goals be to be mentioned clearly, so that the employees understand the necessity of the methods of ICT used in the operational procedures. Apart from th at, the usage procedures must be mentioned in the document (Gatautis 2015). Evaluation of sources Formulation of the document for the University employee requires usage of some sources and acts that are essential for enriching the quality of the document. The sources about the procedures are taken from recognized and reputed official websites of the related to the technologies used in ICT. Apart from that, there are related laws and legislations that are essential for the University while implementing the different policies of ICT and Information management and security systems (Ellis and Loveless 2013). It is seen that the document provides a brief description of the policy information and the relevant legislation, related policies, procedures, forms, websites and publications. Besides this, the document defines various terminologies that a reader might face difficulty. It is a good advantage for the viewers of the document while understanding the necessity of the various procedures of ICT in the operational procedures of the organization. The credibility and the quality of the sources chosen for creating the document for ICT implication is high and hence increase the quality of the document (Haddon 2016). Analysis of the voice and style The document is written in a simple English language. There is a reason of using simple English language because it is addressed for all categories of employees working in the organization. The use of ICT is not only implemented for the senior level management of the organization. It is also used for improving the performance of the junior level of employees. Hence, it can be said that the level of qualifications and expertise for senior, middle and junior level employees are not same (Prytherch 2016). Language is made lucid. But it is seen that in some parts of the documents where the procedures and the implementation part of various approaches of ICT and Information management and security systems are used, language is not clear and lucid. Junior employees or the employees that are not related to IT department will face problem in understanding the purpose and goals of using ICT in the process of business operations. Language can be much more lucid, simple and must possess some cla rity for the non-IT readers (Child 2015). Structured arguments The structured arguments, visual emphasis strategies, imperative or declarative sentences, warrants, claims, data, fallacies and argumentative strategies, etc. are present in the document. There are different legislations, policies that are related to the integration of various approaches of ICT in the operational departments of the organization. Arguments present in the document decrease the quality of the documents. It is responsible for creating fallacies in the document while diminishing the quality of the content presented by the authors while formulating the document. The purpose of the document is to provide a clear and crisp idea to the various levels of management of the organization. The data warrants, etc, are presented from the credible sources. Hence, no question will arise regarding the data, claims and warrants of the procedures of Information management and security systems and ICT (Fuglseth and Sreb 2014). Description of the process is not clear that will provide an in-depth understanding of the procedures of ICT in the implementation of these processes in the day to day operations of the organizations. It means that the customization of the approaches is missing. Conclusion It can be concluded that the purpose of the study is to analyze the document formulated by University while describing the purposes and procedures of using various technologies of ICT in the human resource department, incident management, asset management, and other operational department of the university. The analysis of the document is divided into few categories such as quality of writing, effectiveness of the strategies, structured argument, lucidity of the language, fallacies present in the document. However, it can be said that there are many issues of the document pointed out in the study that can create problem for the readers. Recommendations will be provided in the following for improving the structure of the document. Recommendations Various communication channels are to be introduced for the improvement of communication model such as face to face interaction, SMS, gentle reminder through other applications. By increasing the level of communication among the different groups of employees, the effectiveness of the strategies can be increased. The usage patterns of the approaches of ICT and information management and security systems must be introduced so that the document can gets clarity. No such recommendation is provided regarding the sources used in the document related to process used in ICT as they are highly credible and informative, hence increase the validity of the document. The language of the document should be kept more simple, clear and lucid so that the readers of the non-IT department will face no problem regarding the purpose of creating the document (Sultan 2013). The structured argument and the fallacies present in the document must be reduced so that the readers find no difficulty in understanding the purpose of using ICT in the organization. References Child, J., 2015.Organization: contemporary principles and practice. John Wiley Sons. Diniz, E., Birochi, R. and Pozzebon, M., 2012. Triggers and barriers to financial inclusion: The use of ICT-based branchless banking in an Amazon county.Electronic Commerce Research and Applications,11(5), pp.484-494. Ellis, V. and Loveless, A. eds., 2013.ICT, pedagogy and the curriculum: Subject to change. Routledge. Fuglseth, A.M. and Sreb, ., 2014. The effects of technostress within the context of employee use of ICT.Computers in Human Behavior,40, pp.161-170. Gatautis, R., 2015. The impact of ICT on public and private sectors in Lithuania.Engineering Economics,59(4). Haddon, L., 2016.The social dynamics of information and communication technology. Routledge. Hislop, D., 2013.Knowledge management in organizations: A critical introduction. Oxford University Press. Prytherch, R., 2016.Harrod's librarians' glossary and reference book: a directory of over 10,200 terms, organizations, projects and acronyms in the areas of information management, library science, publishing and archive management. Routledge. Rice, R.E. and Leonardi, P.M., 2013. Information and communication technology use in organizations.The Sage Handbook of Organizational Communication. Thousand Oaks, CA: Sage, pp.425-448. Solar, M., Sabattin, J. and Parada, V., 2013. A Maturity Model for Assessing the Use of ICT in School Education.Educational Technology Society,16(1), pp.206-218. Sultan, N., 2013. Knowledge management in the age of cloud computing and Web 2.0: Experiencing the power of disruptive innovations.International Journal of Information Management,33(1), pp.160-165. Yuan, Y.C., Zhao, X., Liao, Q. and Chi, C., 2013. The use of different information and communication technologies to support knowledge sharing in organizations: From e?mail to micro?blogging.Journal of the American Society for Information Science and Technology,64(8), pp.1659-1670.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.