Type of paper:Â | Thesis |
Categories:Â | Information technologies Intelligence |
Pages: | 6 |
Wordcount: | 1389 words |
3.7 End User Support
3.7.1 What’s in it for the users and consumer
Concerning the users and customers of the IC ITE, the DNI evaluates their expectations, hence shares with them security information based on their specific logs. Firstly, some factors influence the relationship of the IC ITE. The major items include information access, performance, trust, privacy, and security.
3.7.2 Information Access
IC ITE users are required to deal with some security issues that improve the usability of factors that lead to the content presentation. Each of these factors achieves its function based on the quality of infrastructure. The navigation of creates a strong sense of structure where users should understand the nature of the network while reacting to the user navigation. Understanding and navigating the systems are the first stages of ensuring that it is possible to achieve a reliable option of system usability[1]. Through usability, it is feasible to optimize the objectives of security in information systems.
3.7.3 Trust
The organization has to consider how trust influences the competence of business. Primarily, if the users and consumers experience the poor performance of the system, they might fail to adapt the technology because of the possible security breaches. Hence, the general impact might be negative depending on the expected perceptions of such an adoption. In response, there is a general need to develop the right systems, both hardware, and software was both if implemented, should create a huge security buffer[2]. In response, Hart maintains that the trust relationship creates a fundamental principle that relates to the particular business environment[3]. Suggestively, the trust refers to the ability to develop and address privacy and real visible way. The privacy statement is more of disclaimer where developers provide consumers with the appropriate information concerning collection and utility. Trust also requires a justifiably a high level of confidentiality and protection that involves determining the specific associations.
3.7.4 Security
IC ITE should ensure that users and consumers enjoy some sought of security where it will be possible minimize threats of the stolen transaction and the potential misuse of personal information resulting in the failure of the business not meeting the associated environment. The security issues are commonly considered within the ITE environment. Users such as administrators see the success of IC ITE security be ensuring that they can easily understand the need to the execute the mission of the IC while exploring the possible solutions that will increase the efficiencies and areas of continuity for security for finance, logistics, and the acquisition. It is also notable that the IC-broad performance criteria depend naturally on the ability to evaluate the data reviews while developing the right strategy for the performance and strengthening the overall I.T network. The IC also ensures that the IC promotes information security through recreating the right customized information[4]. In response, the IC ITE environment might require
· Persuasion of the good procurement strategies across the IC infrastructure while ensuring that the right cost-effective infrastructure and the acquisition methodologies are adopted.
· Advancing the right personal security infrastructure while ensuring the possible support of one community approach and evaluation of the various standard practices for the good IT standards.
· Determining the strategies of implementing the right IC enterprise standards, tools, services and processes that are acceptable for industry and best practices
· Creating the right existing infrastructure for the future IC facilities as well as respecting the infrastructure and supporting the joint usage of energy.
· Monitoring the right strategy based performance mechanisms while evaluating the future of the network based on the IC support structure, informed decision-making process and the stable situation.
4. A CULTURE OF COLLABORATION
4.1 The benefits of the IC ITE enterprise
DNI information sharing procedure is oriented from a culture of the collaboration which benefits the IC ITE enterprise. Organs under the DNI for instance the Joint Information Environment a principle information organ for the DOD and the IC ITE play an important role in bringing various security organs to the DNI desk. However, there should be the right regulation based on the infrastructure, security architecture and enterprise services. The changes in the leverage of various integrated cloud services, IC desktop, common back office, analytical applications and access of the data centric computing is related to the different government cloud architectures.
The C2S functions perfectly well with the cloud environment for the senior architect of the National Geospatial Intelligence Agency that ensures the perfect consummation for the NGA and ensuring that there is a perfect application under the preexisting operational needs which play an important role in meeting different operational needs. Clearly, the Geospatial Integration Joint Venture for the Leadership is a perfect roadmap in emphasizing the collaboration. As a satellite program under the DNI, it is clear that the perfect requirements results in driving the functionality for the appropriate capability that are consistence data usage and appropriate visualization. For instance, integrating and operating inside the IC ITE framework that helps in the tight coupling of data.
The sharing within various security organs plays an important role in advancing the quality of information sharing and integration. A section of the DNI creates a massive effort that provides the right GEOINT and multisource intelligence content for the IC operation. The intelligence surrounding the IC infrastructure relates to the immediate access to the geospatial data which is collected from the various sources of information domains. In such an environment, the DNI plays the role of an immerse analysts of data. As illustrated earlier, the DNI guides the IC ITE in creating a common desktop environment for all the applications that surround a given enterprise models based on the common services that are unified for a common service network. In such a scene, the IC DTE environment being operated by DNI and the NGA are mandated in operating the desktop environment that helps in managing collaboration tools while sampling video conferencing capabilities for the IC DTE environment. The DNI and NGA hence provide the DTE with the right functionality of intelligence while creating a steadfast approach for meeting the DNI expectations.
4.2 Scenarios & Examples
Linwood native Sam Ojserkis, the coxswain of the U.S. men's eight boat, fell just short of an Olympic medal Saturday morning in Rio.
A slow start put the United States behind, and it couldn't make up the distance, finishing fourth in the final in 5 minutes, 34.23 seconds.
4.3 Trust & Standardization of Applications and Tools
4.4 Security Clearance Process
The classified work of the NGA presents top level security clearance of all top security advisers and operators either working in the office of the DNI or those affiliated to the office of the NGA. In clearance, there is a need to take a polygraph examination for all security officials. Each of personnel security detail is required to exhibit character, reliability, trustworthiness while have perfect sound judgment skills. During clearance process, the investigation is inclined more on the ability to verify specific user details for instance data concerning supervisors, coworkers, friends and neighbors.
The investigations further reveal that there are specific conflicts of interests that mature when a candidate feel coerced or the candidate is willing to apply to different regulations concerning the protection of sensitive information as well ensuring that candidates meet the appropriate high level security clearance standards as set by the DNI and the NGA. This further depends on the background situation that surrounds the course of investigation. The application further questions the doubts surrounding the specific environment surrounding the course and the investigation. As such, there are various misrepresentations that might question the fitness and honesty of the candidate. This further seeks close examination of the background of the individual while exploring the serious doubts that might arise to the establishing of the applicant information and data.
The individual is further cleared from the NGA adjudicator where he reviews and results for the personnel and various security advisers who are access the classified information. The goal is to ensure that the individual has the ability to position personal trust while weighing the adjudication process based on the candidate personal circumstances that surround the various factors that might results to the candidate being employed in the required position. Once the adjudication process is complete, the next focus is creating is aligning the candidates to the Human Development Director where they are assigned to various roles.
Cite this page
Information Technology Thesis - Free Essay. (2018, Mar 29). Retrieved from https://speedypaper.com/essays/101-information-technology-thesis
Request Removal
If you are the original author of this essay and no longer wish to have it published on the SpeedyPaper website, please click below to request its removal:
- Narrative Argument about Education, Free Essay
- Argumentative Essay Example on Obesity and Junk Food
- An Argumentative Essay Example to the Topic "Perseverance"
- Essay Example: Meta-Analysis Design Research
- Free Essay Comprising a Participant Observation of a Subculture - Music Producers
- Free Essay: Can We Afford This Project?
- Essay Sample on Women and Work in Cameroon
Popular categories