Saturday, July 27, 2019
Computer Sciences and Information Technology Coursework
Computer Sciences and Information Technology - Coursework Example Outsourcing aids in mitigation of risks, through pieces of training to employees by professionals, outsourced on subjects as catastrophes, hazards and prevention methods, and hence there are minimal injuries. Due to competition amongst companies, research on new products and services is very crucial, this entails introduction of new processing lines, improvement in service delivery, analysis and testing of the new products among others, All these requires the input of a third party and it will involve outsourcing as the introduction of the new techniques requires professionals (Belohlavek, 2007). Insourcing is a business model in which a company awards a contract or give a certain task to itsââ¬â¢ own employees and hence work that would have been done by a third party is done in-house. Through the use of itsââ¬â¢ employees in carrying out functions, there is the creation of a team of skilled personnel who understands the system better, this ultimately improves the efficiency and tasks are done well and at the right time. Insourcing also aids in the reduction of the cost of labor as insourcing requires the input of permanent personnel employed by the firm (Belohlavek, 2007). I.T portfolio management system entails the use of scoring model systems in rating projects whereby a list of criteria is developed whereby projects are rated on each criterion to yield attractiveness scores for each project and hence projects can be rated in relation to the attractiveness scores. There are different kinds of scoring systems; Celanese scoring model, Dupont scoring model, Exfo model and computer-based scoring model. Scoring models are very important and they are a source of data which is utilized in meetings whereby project attractiveness is compared to cut off criterion, thereby in portfolio review stage the outputs used in ranking the projects.Lack of physical evidence when testifying jeopardise the computer crime cases, relying on second hand information or hearsay may bring forth doubts on the evidence presented. If an expert use difficult technical terms that are difficult to understand to the jury or attorney when testifying, understanding of the evidence presented may be difficult. Use of unqualified experts in testifying a computer crime case is a great challenge as the expert lacks the understanding of the subject matter and may end up presenting substandard evidence moreover he/she may be emotional if provocative questions are posed, moreover they hav e no knowledge on the legal process (Belohlavek, 2007).
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.