OtherPapers.com - Other Term Papers and Free Essays
Search

It Metrics

Essay by   •  August 23, 2015  •  Research Paper  •  511 Words (3 Pages)  •  1,232 Views

Essay Preview: It Metrics

Report this essay
Page 1 of 3

1. Discuss some common IT metrics for strategic initiatives and how/why they are measured.

IT Metrics:

        Metrics act as indicators for change in strategic direction. Information technology is developed on the basis of best practice frame works. The main reason for the metrics program is because it helps IT to collect the voice of the customer data.

Common IT metrics:

  • Customer satisfaction score:

In any company customers play a vital role because they are key to the success of any company. We can also measure the customer satisfaction through VOC, NPS, and CSAT.

  • Employee satisfaction score:

To build up a good business we need to have perfect employees who will be apt to that field. Employee satisfaction score can be measured through Gallup surveys.

  • Cash flow:

In cash flow we need to keep our payments lower than your collections. The cash flow depends on the daily sales outstanding and also daily payments.

  • Productivity:

Productivity metric is tied tightly to the business. The strategic goal of the productivity depends on the numerator and denominator for the output per unit.

  • Gross margin:

Gross margin is the mother of all business metrics. In the gross margin when your sales are higher then our costs are perfect.

  1. How do Ethics apply to Information Technology? Provide two specific examples of information ethics.

Ethics to IT:

        The world is evolving fast in the field of computer technology so it is important than we are setting ethical values to the established computing. The word information ethics is used to describe the study and evaluation of the various ethical issues that arise by sharing of electronic data.

Using ethics in information is:

  • Avoiding plagiarism
  • Giving credit to the original author

Example:

  • We can use the information of someone else’s author and to create a new paper with the same information.
  • An authorized legitimate mash up record.
  • Copyright holder can be contacted for permission to use material in one time basis.

4. What are 3 areas that a Security Plan should address? Describe each??  

Security Plan:

        A security plan is a formal plan that secures the computer & information security. A system security plan is mostly implemented in the organizational IT environments. The security plan is a proposed plan is to protect and control information of any IT organization.

...

...

Download as:   txt (2.9 Kb)   pdf (111.4 Kb)   docx (6.7 Kb)  
Continue for 2 more pages »
Only available on OtherPapers.com