Question

In: Operations Management

As a risk manager, should you approach regulations as a risk to information systems? Do you...

As a risk manager, should you approach regulations as a risk to information systems? Do you see regulations as important measures to strengthen information security or as ways to exert unnecessary control over organizations?

Solutions

Expert Solution

Risk managers taking the regulations on regard with the information systems are considered an effective manner in my opinion to analyse and understand the machanism and management of the information system. The importance of regulations to strengthen the information system and the security are as follows:

1. Standard: The regulations we made on the information system helps us to effective analyse and set the standards of the information system. It helps to set the objectives about how the technology would help the organistaion to achieve more heights and how those standards can be calculated with the actual work performed. It helps to achieve the targets and the objectives effectively efficiently for the information system.

2. Discipline: Under the regulations, Another factor which helps the information system is the discipline factor. Regulatory factors helps in maintaining the standardised and the discipline about the information system. Who will control, who would delegate and who will get the data extracted and who would select the data and who will show the dara, all these discipline factors and the organisational factors are under the regulatory feature for this information system.

3. Effective Results: At last, the regulation of the information system would help to declare the effective results of the information system. The regulation would help to channelise and check hoe effective the standards are. If the accuracy of the standards can be calculated, the results can also be analysed ad compared to the standards of how the company and its information system is working.


Related Solutions

How do you approach risk assessment in a hospital?
How do you approach risk assessment in a hospital?
Do you feel that information systems to fight terrorism should be developed and used even if...
Do you feel that information systems to fight terrorism should be developed and used even if they infringe on privacy rights or violate the Privacy Act and other such statutes? Notes: answer by using your own words, please. the name of the course is "Professional Computing Issues."
Why is it important for organizations that use Information Systems should also be using a Risk...
Why is it important for organizations that use Information Systems should also be using a Risk Management function to protect themselves and the consumers who purchase their products or services? Explain
How do you think Health Information systems should work within the corporate setting? How do you...
How do you think Health Information systems should work within the corporate setting? How do you think it actually works within the corporate setting?
You are the marketing manager for a line of soaps and shampoos. How do you approach...
You are the marketing manager for a line of soaps and shampoos. How do you approach your segmentation on a platform like Facebook/Instagram? Be specific.
How do Risk Management functions and Information Systems resources complement one another?
How do Risk Management functions and Information Systems resources complement one another?
Financial institutions are subject to regulations to ensure that they do not take excessive risk and...
Financial institutions are subject to regulations to ensure that they do not take excessive risk and they can safely facilitate the flow of funds through financial markets. Nevertheless, during the credit crisis, individuals were concerned about using financial institutions to facilitate their financial transactions. Why do you think the existing regulations were ineffective at ensuring a safe financial system? brief in approximately 350-400 words
Do online research and Describe the ethical and legal issues in information systems security. It should...
Do online research and Describe the ethical and legal issues in information systems security. It should not exceed 1 page
Describe and explain what you feel is the most significant risk of information systems.
Describe and explain what you feel is the most significant risk of information systems.
What are enterprise systems and how do you perform risk analyses on them?
What are enterprise systems and how do you perform risk analyses on them?
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT