Thursday, May 16, 2019

Information Paper

Use Daniell Jackson CIS 207 August 1, 2012 herds grass Thacker According to (Anthony Robbins, 2010) The way we communicate with otherwises and with ourselves ultimately determines the quality of our lives. It is imperative that in any organization at that place needs to be a detailed and efficient flow of information. Communications is the key for a chore to be successful, and it provides the solid foundation necessary to construct a solid worry process. One other very important part of communication theory in a company is the flow of that information which ultimately produces the results whether good or bad.This paper will describe how information is used and how it flows at memorial logistical Agency (DLA) Document Services Jacksonville in the IT department. It will also describe any names with properly lordly the information flow, including keeping it safe from unauthorized use. DLA Document Services Jacksonville is a Department of Defense ( defense mechanism) look ou t over that provides a web-based solution for ordering documents. The communication flow starts from the customer level as documents such as publications, posters, retirement programs, and many more available products are ordered on argument.Although the Document Services Online website where most of the communications is done electroni titley, there is still a need for communication flow for those of us here at DLA in order to produce the customers required results. I thought it would be fitting to compare the communications that I draw experienced here at DLA and my military communications experience, to show some of the differences As a 23 year retired veteran of the United States Navy, communications becomes a major part of ordinary life.Military men and women are introduced to what is known as the chain of command and the structure in which it is written at each command. Communications is something that we are taught not to take for granted because it could be the difference between losing and preservation a life in a given situation. Once retired and transferred into what most military men and women call The Civilian World, I immediately discovered that there is a difference concerning military and civilian communications, the flow, and the concern of controlling that information.Here at DLA document services we have a variety of force-out that come in concert to produce products for the customer. The accountants manage and handle financial issues, machine workers print and produce the orders, information technology personnel primary(prenominal)tain the servers, and management oversees the entire business process. Upon reporting for work here at DLA, I have been privileged to several communication issues that have caused issues, but have been addressed and changes put in place.One of the main issues I discovered was that as the network security engineer, there was no communications between the trunk administrators working on the servers. There was no sharing of information, which consistently resulted in changes to the schema by the system administrators, but no upward communications of these changes through the IT department. The program manager was not informed of the lose of maintenance on the servers and the only concerned seem to be that the systems stay up to produce orders.This line of thinking was unfamiliar to me and I felt it would be a recipe for disaster. Information sharing is unfavorable to an organizations war-riddenness and requires a free flow of information among members if the organization is to remain competitive (JP Hatala and J Lutta, 2008). Although we held a bi-weekly meeting that consisted of minutes from the last meeting and the old business to new business concept, it was clear that it served no purpose and I was determined to change that concept.I introduced the Configuration Control Board (CCB) to the political platform Manager and showed her how it would make our meetings more effective by a llowing communications to flow from the bottom to the top. Eventually I was able to get the SAs to fill out a configuration change form and leave office that form through the leadership, so that all parties would be aware of any major changes to our systems. We ensure that our transmitting and handling of sensitive information is handled discreetly. The protection of our information is controlled on a need-to-know basis, which is the same as when I was in the military.The only concern that I had was sending and receiving emails with sensitive information such as mesh Protocol (IP) addresses and other detailed information via e-mail without encryption. We started ensure that we encrypted our emails to add that extra layer of needed security on sensitive documents. We also started the digital signature initiative that ensures all CCB documents are truly signed by each responsible IT department personnel, using our Common Access Cards (CAC).The DoD CAC card allows employees to have their own unique identification, authentication privileges, encrypting, and crypto graphical ability to sign emails and other documents. DLA Document Services Jacksonville delivers quality products to the men and women of our military. Although there were some issues with communications, the improvements have been astounding. We realized that when companies are dealing in the information technology field there is a need for excellent communications amongst team members up, and win the organization so that the best customer service can be provided.We discussed the importance of ensuring that communications is protected and secured because it is the cornerstone of maintaining that need-to-know responsibility. References Anthony Robbins (2010), Power of Giving. Retrieved on July 30, 2012 from http//www. power-of-giving. com/tony-robbins-quotes. html JP Hatala and J Lutta (2008), Managing Information Sharing Within an Organizational place setting A Social Network Perspective. Retriev ed July 30, 2012, from https//ehis. ebscohost. com/eds/pdfviewer/pdfviewer? vid=2&hid=3&sid=8a83ca4d-a18d-4679-b2e7-f631c1b0a62c%40sessionmgr11

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.