




版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领
文档简介
ManagingInformationServices
QualitySlide11.1LearningoutcomesAfterreadingthischapter,youwillbeableto:Identifydifferenttypesofinformationservicedelivery;Explaintheconceptoftotalcostofownership;Defineapproachesformanagingend-usercomputingandoutsourcing.Slide11.2ManagementissuesTypicalquestionsfacingmanagersrelatedtothistopic:Howdoweevaluateservicelevelsdeliveredtoendusers?Howdowemanageend-userdevelopment?Howdoweminimizetotalcostofownershipforinformationsystems?Slide11.3Whatisinformationservicesdelivery? Together,theoperationalmanagementofaccesstoinformationanddatamanagementisknownasInformationservicesdelivery. Thetypeandnameoftheorganizationalunitwhichdeliversinformationservicesvarieswidelyaccordingtothetypeoforganization.Typicaltitlesofthisunitordepartmentarrangedfrommoderntotraditionallabelsare:InformationservicesInformationandlibraryservicesInformationCenter(typicallyaUSterm)ComputingservicesITdepartmentIThelpdeskISdepartmentDataProcessing(DPdepartment)
Slide11.4End-usercomputingEnd-usercomputing(1)Theresourcinganddeliveryofinformationservicestoend-users,(2)Thedevelopmentofbusinessapplicationsbyend-users.Slide11.5Differentaspectsofinformation
servicequalitymanagementFigure11.1DifferentaspectsofinformationservicequalitymanagementSource:BIMSlide11.6TheservicegapmodelFigure11.2TheservicegapmodelSource:Parasuramanetal.(1985)Slide11.7Servicequalityattributesreliability–theabilitytoperformtheservicedependablyandaccurately–foranintranetthiswouldbeinfluencedbythespeedwithpagescanbedownloadedandtheavailability–theaverageamountof‘down-time’thereiseachday;responsiveness–awillingnesstohelpcustomersandprovidepromptservice–foranintranetthiscouldrefertoresponsetimetodownloadinformation,butalsohowresponsivethestaffsupportingtheintranetwere;assurance–theknowledgeandcourtesyofemployeesandtheirabilitytoconveytrustandconfidence–thisisagainsomethingthatisconveyedbythesupportorhelp-deskstaff;tangibles–thephysicalappearanceoffacilitiesandcommunications–inthecontextofanintranetthisistheinformationqualityattributessuchasrelevance,accuracy,timelinessandpresentationwhichiscoveredseparatelyinthenextsectionandwasinthepreviouschapter;empathy–providingcaring,individualisedattention–foranintranetthiswouldrefertohowhelpfulthestaffsupportingtheintranetwere.Itcouldalsorefertotheoverall‘lookandfeel’oftheserviceindicatingthedegreetowhichitcouldhelpsolveusers’tasks.Empathycouldbeincreasedbyinteractiveservicessuchasaskingquestionsonline.But,whataboutcost?Slide11.8InformationdeliveryoptionsPushinformationfromcentralresourcePullinformationresourcesfromwebsordatabasesSlide11.9DifferentGoogleSearchApplianceoptionsFigure11.3DifferentGoogleSearchApplianceoptionsSource:Google,MountainViewCalifornia(/appliances/products.html)Slide11.10UKInformationsecuritybreaches(a)Typesofbreaches(b)Costofworstincident.Figure11.4UKInformationsecuritybreaches(a)Typesofbreaches
(b)Costofworstincident.Source:DTI(2004)Slide11.11aUKInformationsecuritybreaches(a)Typesofbreaches(b)Costofworstincident.Figure11.4UKInformationsecuritybreaches(a)Typesofbreaches
(b)Costofworstincident.Source:DTI(2004)Slide11.11bCOBITcontrolsoninformationservicedeliveryDS1defineandmanageservicelevelsDS2managethird-partyservices
DS3manageperformanceandcapacityDS4ensurecontinuousserviceDS5ensuresystemssecurityDS6identifyandallocatecostsDS7educateandtrainusersDS8assistandadvisecustomersDS9managetheconfigurationDS10manageproblemsandincidentsDS11managedataDS12managefacilitiesDS13manageoperationsSlide11.12Addressingorganizationalsecurity InformationCommissionersuggeststhesequestionsthatanorganizationneedstoasktoensureithasadequatesecurity:1.Doesthedatacontrollerhaveasecuritypolicysettingoutmanagementcommitmenttoinformationsecuritywithintheorganization?2.Isresponsibilityfortheorganization’ssecuritypolicyclearlyplacedonaparticularpersonordepartment?3.Aresufficientresourcesandfacilitiesmadeavailabletoenablethatresponsibilitytobefulfilled?Slide11.13MoresecurityquestionsMoredetailedquestionsposedbytheInformationCommisionertoassesscontrollingaccesstoinformationare:Isaccesstothebuildingorroomcontrolledorcananybodywalkin?Cancasualpassers-byreadinformationoffscreensordocuments?Arepasswordsknownonlytoauthorisedpeopleandarethepasswordschangedregularly?Dopasswordsgiveaccesstoalllevelsofthesystemoronlytothosepersonaldatawithwhichthatemployeeshouldbeconcerned?Isthereaprocedureforcleaningmedia(suchastapesanddisks)beforetheyarereusedorarenewdatamerelywrittenoverold?Inthelattercaseisthereapossibilityoftheolddatareachingsomebodywhoisnotauthorisedtoreceiveit?(e.g.asaresultofthedisposalofredundantequipment).Isprintedmaterialdisposedofsecurely,forexample,byshredding?Isthereaprocedureforauthenticatingtheidentityofapersontowhompersonaldatamaybedisclosedoverthetelephonepriortothedisclosureofthepersonaldata?Isthereaprocedurecoveringthetemporaryremovalofpersonaldatafromthedatacontroller’spremises,forexample,forstafftoworkonathome?Whatsecuritymeasuresareindividualmembersofstaffrequiredtotakeinsuchcircumstances?Areresponsibilitiesforsecurityclearlydefinedbetweenadataprocessoranditscustomers?Slide11.14Businesscontinuityplanning Managingforbusinesscontinuityordisasterrecoveryseekstocontroldisruptionifthemethodsforprotectionofinformationareinsufficient. Disruptioncanresultfrommaliciousdeletionofinformationthroughahacker,employeeorasaresultofavirusasdescribedinChapter12. Disruptioncanalsooccurthroughso-called‘Acts-of-God’.Herenaturalhazardssuchasfire,floodorstormcausecomputers holdinginformationtobedestroyed. Actsofterrorismcanalsodestroycomputersandtheinformationtheycontain. Organizationsneedtoplanforbusinesscontinuityintheeventofamajorincidentthatdestroystheworkingenvironmentand/orITbyensuringthatifinformationortechnologyislostordestroyed,thebusinesscancontinuewiththeminimumdisruptionpossible.Slide11.15Questionsonbusinesscontinuity TheUKInformationCommissionergivesguidelinesbasedonaskingthesequestionstocheckthatprotectionmeasuresareadequatetoensurebusinesscontinuity:Aretheprecautionsagainstburglary,fireornaturaldisasteradequate?Isthesystemcapableofcheckingthatthedataarevalidandinitiating[automaticallyscheduling]theproductionofback-upcopies?Ifso,isfullusemadeofthesefacilities?Areback-upcopiesofallthedatastoredseparatelyfromthelivefiles?Isthereprotectionagainstcorruptionbyvirusesorotherformsofintrusion?Slide11.16Computerviruses Computervirusesareamajorthreattocompanyandpersonalinformationsinceitisestimatedthatthereareover60,000computerviruses.Theyareaspecificinstanceofasecuritybreach.Computerviruses Aprogramcapableofself-replicationallowingittospreadfromonemachinetoanother.Itmaybemaliciousanddeletedataorbenign.Slide11.17Boot-sectorviruses 1.Boot-sectorvirus.Someofthemostsuccessfulormostdestructivevirusesspreadwhenfloppydiskswerewidelyused.Theseboot-sectorvirusesexistonthefirstsectoronafloppydiskorharddiskknownastheMasterBootRecord(MBR).Ifacomputerisswitchedonwithaninfectedfloppy-diskinthedrivethisactivatestheviruswhichwasthentransferredtotheharddiskandallfloppy-diskssubsequentlyusedinthatmachine.‘Brain’wasoneofthefirstbootsectorviruseswhichemergedin1986.Amorerecentexamplefromthestartofthe1990sis‘Michelangelo’whichwasoneofthemostdestructivebootsectorviruses.ThenamewasgiventoitbyaresearcherwhonoticedthatitstriggerdatewasthesameasMichelangelo'sbirthday,6March(1475).Slide11.18Worms 2.Worms.Awormisasmallcomputerprogramthatreplicatesitselfandthentransfersitselffromonemachinetothenext.Oneofthefirstwormswasdevelopedin1988byRobertMorrisandisdescribedintheprevioussectiononhacking.Sincenohumaninteractionisrequired,wormscanspreadveryrapidly.In2003,theslammerwormexploitedasecurityloopholeinMicrosoftSQLserverdatabaseproductandrapidlyinfected75,000machines.Eachinfectedmachinesentoutsomuchtrafficthatmanyotherserversfailedalso.ThiswasoneofthefastestspreadingvirusesofalltimeasFigure11‑5shows.InfutureitseemssuchwormswillbringtheInternettoacompletestandstill.Slide11.19Macro-viruses 3.Macro-viruses.Macro-virusesareamorerecentphenomenon.TheypiggybackondocumentscreatedbyOfficeapplicationssuchasMicrosoftWordandExcel.Officesoftwaresuchasthishasamacro-facilitytohelpusersrecordcommonactionssuchasformattingortodevelopmorecomplexapplicationsinVisualBasicforApplications(VBA).Macro-viruswritersdevelopvirusesthatspreadwhenadocumentisopened.Typicallyitwillattachitselftoallsubsequentdocumentsthatareopened.Sincedocumentsandspreadsheetsarecommonlysharedinandbetweenoffices,thesevirusescanspreadveryrapidly.OneofthefirstWordmacroviruseswastheWord‘concept’virusfrom1995.Oneofthebestknownmacro-virusesis‘Melissa’.ThisstruckinMarch1999anditmarkedanewtrendasitcombinedamacroviruswithonethataccessedtheaddressbookofMicrosoftOutlooktoe-mailitselftonewvictims.ThiswasoneofthefastestspreadingvirusesinhistoryanditisestimatedthatitaffectedoveramillionPCs.In2002,theauthoroftheMelissavirus,DavidL.Smith,wassentencedto20monthsinprisonintheUS.Slide11.204.E-mailattachmentviruses 4.E-mailattachmentviruses.Thesevirusesareactivatedwhenauserofane-mailprogramopensanattachment.Melissaisanexampleofsuchavirus.Theytypicallyreplicatebyaccessingtheaddressbookandsendingcopiesofane-mailwiththesameattachmenttoeveryoneintheaddressbook.Effectivelytheyarethenactingasaworm.Anevenmoredestructiveviruswaslaunchedin2000.‘TheLoveBug’viruscontainthesubjectline‘Iloveyou’.Whilethemessagecontainsthetext‘kindlychecktheattachedLOVELETTERfromme’whichisanattachedfilecalledLOVE-LETTER-FOR-YOU.TXT.VBS.ThevirusdeletedimageandaudiofilesandaccessedInternetserverstosendoutdifferentversionsofitself.AccordingtoCyberatlas(2003)itwasestimatedthatnearly$9billiondamagewasdonethroughthisvirus.Muchofthecostisnotthelossofdata,butthecostofhiringspecialiststorectifytheproblemorstafftimelost.Slide11.21Trojans 5.Trojanviruses.ATrojanisavirusthatmasqueradesasabonafideapplication.TheyarenamedaftertheGreekmythofthegiantwoodenhorseusedbyattackerstogainaccesstoTroyinordertoattackit.Examplesincludeutilitiessuchasafilesharingprogram,ascreensaver,upgradestosomesystemcomponentsorevenimitationanti-virusprograms.Theadvantageforviruswritersisthattheprogramscanbemuchlarger.OneofthemostfamousTrojansis‘BackOrifice’,reputedlydevelopedbyahackinggroupknownas‘CultoftheDeadCow’.Thiscouldbeattachedtootherlargerfilesandgavecompleteaccesstoamachineforahacker.Slide11.22Hoaxe-mailviruses 6.Hoaxe-mailviruses.Thesearewarningsaboutviruseswhicharenotrealviruseswhichasktherecipienttosendthewarningontotheirfriends.Theyarenotusuallymalicious,butcancontaininstructionsonhowtoremovethevirusbydeletingfileswhichcouldcausedamage.Theycausedisruptionthroughtimelost.Thisisatypicalexampleofacarefullycraftedhoaxe-mailwhichwaswidespreadin2003:Toallofmyemailcontacts, Unfortunatelyavirushasbeenpassedtomeandmanyotherpeople,youmayalreadyhaveitfromsomeothersource-throughanaddressbookviruswhichalsoinfectedmyaddressbook.Sinceyouareinmyaddressbook,youwillprobablyfinditinyourcomputer,too.Thevirus(calledjdbg.exe)isnotdetectedbyNortonorMcAfeeAnti-virussystems. …Iwassentthisemailandamnowpassingitontoyouastohowtocheckforthevirusandhowtogetridofit.Pleasedothis!It'sverysimpletodoandtakesabout3mins.
Slide11.23Ananti-viruspolicy1.Thepreferredanti-virussoftwaretobeusedonallmachines.2.Thefrequencyandmechanismforupdatinganti-virussoftware.3.Thefrequencywithwhichthewholeend-userPCissystem-scannedforviruses.4.organizationalblockingofattachmentswithuncommonextensions.5.organizationaldisablingofmacrosinOfficeapplications.6.Scanningtobeperformedonmailserverswhene-mailsfirstreceivedandbeforevirusessent.7.RecommendationsonuseofSPAMfilteringsoftware.8.Backupandrecoverymechanisms.Slide11.24Whatyoucando…1.Donotswitchoffmachineswhenthefloppydiskisstillinthedrive(reducestransmissionofboot-sectordrives).PCscanalsobeconfiguredsuchthattheydonotbootoffthefloppydrive.2.Donotopenattachmentstoe-mailsfrompeopleyoudon’tknow(reducestransmissionofe-mailattachmentviruses).Sincesomeviruseswillbesentfromtrustedsources,onlyopenattachmentswhichlooklegitimate,forexampleWorddocumentswithrelevantnames.Somevirusesusefileextensionsthatarenotcommonusedsuchas.pif,.scror.vbs.Viewingdocumentsratherthanopeningthemforeditingcanalsoreducetheriskoftransmission.3.Downloadsoftwareonlyfromtheofficialsource,andalwayscheckforvirusesbeforeinstallingthesoftware(reducesriskofTrojanhorseviruses).4.DisableorturnoffmacrosinWordorExcelunlessyouusethemregularly(reducesriskofmacroviruses).5.Backupimportantfilesdailyifthisfunctionisnotperformedbyasystemadministrator.Slide11.25ThegeographicspreadoftheSlammerworm30minutesafterreleaseFigure11.5ThegeographicspreadoftheSlammerworm30minutesafterreleaseSource:UniversityofBerkeley(/-nweaver/sapphire/)Slide11.26ManaginginformationserviceusageMonitoringofinformationserviceusageincludescheckingfor:Useofe-mailforpersonalpurposes.Inappropriateuseofe-mail,possiblyleadingtolegalactionagainstthecompany.UseofInternet/websitesforpersonaluse.Slide11.27E-mailcontrolsControlscanbeintroducedaspartofane-mailmanagementpolicytominimisethevolumeof:1.SPAM(unsolicitede-mail).2.Internalbusinesse-mail.3.Externalbusinesse-mail.4.Personale-mail(friendsandfamily).Slide11.28E-mailvolumeproblemsIn2002itwasestimatedthatthere31billione-mailssenteachday,thisamountsto31billionperyear.Thevolumeofe-mailsamountsto1,829terabytesperdayor3.35terabytesperyear.By2006,e-mailvolumesareexpectedtoincreaseto60billionperday.Thenumberofbusinesse-mailssenteachdayvariesbetween10and50perpersonaccordingtothetypeofroleoftheindividual.Asimilarnumberarereceivedeachdayforprocessing.ThevolumeandproportionofSPAMhasincreaseddramaticallyfromoneinevery1,000e-mailsin2,0001tooneineverythreee-mailsasisshowninFigure11.6.Theamountoftimespentreadingandwritinge-mailcanamounttooveranhourperworkingday.Incredibly,a2003surveybytheAmericanManagementassociationfoundthattheaverageemployeespends25%oftheworkdayone-mail,with8%ofworkersdevotingoverfourhoursadaytoe-mail!Thishighlightstheimportanceofmakinge-mailuseefficient.Despitetheseproblems,86%ofrespondentsstillagreedthate-mailhasmadethemmoreefficient.Slide11.29Proportionofglobale-mailtrafficwhichisSPAMFigure11.6Proportionofglobale-mailtrafficwhichisSPAMSource:MessageLabsSlide11.30MinimisingSPAM1.Avoidharvestingofaddresses.2.EducatestaffnottoreplytoSPAM.3.Usefilters.4.Use‘Peer-to-Peer’blockingservices.5.UseBlacklistservices.6.Usewhitelistservices.7.Challenge/respond.8.Keeplists,filtersandsoftwareup-to-date.Slide11.31ProgressionofattemptstocombatSPAMFigure11.7ProgressionofattemptstocombatSPAM
Source:BIMSlide11.32E-mailprocessinginbusinessesOfsevencommonmanagementtasks,meetingstookup2.8hoursonaverage,dealingwithe-mailcamesecondwithanaverageof1.7hoursandaccessinginformationfromtheInternetaccountedforafurther0.75ofanhour.Respondentsreportedreceivingonaverage52e-mailsperdaywhile7percentreceived100e-mailsperdayormore.Managersreportedthatlessthanhalfofe-mails(42percent)warrantedaresponse.35percentwerereadforinformationonlyandnearlyaquarterweredeletedimmediately.Onaverageonly30percentofe-mailswereclassifiedasessential,37percentasimportantand33percentasirrelevantandunnecessary.Despitethereservationsaboutthequalityandvolumeofe-mailsreceivedthemajorityofrespondents(81percent)regardede-mailasthecommunicationstechnologywhichhashadthemostpositiveimpactonthewaytheycarriedouttheirjob,alongsidetheInternetandthemobilephone.
Slide11.33SampleE-mailmanagementguidelinesOnlysendthee-mailtoemployeesforwhichitisessentialtoinformoract-upon.Banningcertaintypesofe-mail,suchastheclassic‘e-mailtothepersonwhositsnexttoyou’orindividualsinthesameoffice(althoughtherearestrongargumentsforthissincee-mailisanasynchronousmediumandcolleaguesarenotalwaysavailableordon’twishtobedisturbed).Avoid‘flaming’–theseareaggressivee-mailswhichoftenputvoicetofeelingsthatwouldn’tbesaidface-to-face.Ifyoureceiveanannoyinge-mailitisbesttowait10minutestocooldownratherthan‘flaming’thesender.Avoid‘trolls’–theseareaspeciesofe-mailcloselyrelatedtoflame-mails.Theyarepostingstoanewsgroupdeliberatelypostedto‘wind-up’therecipient.Theyarebestignored.Combineitemsfromseparatee-mailsduringtheday/weekintoasinglee-mailfortheday/week.Writeclearsubjectlines.Structuree-mailssothattheycanbescannedquicklyusingsub-heads,numberedandbulletedlists.Makefollow-upactionsclear.Whenreadinge-mail,usefolderstocategorisee-mailsaccordingtocontentandpriority.Performe-mailreadingandcheckinginbatches,e.g.oncepermorning/afternoonratherthanbeingalertedtoandopeningeverye-mailthatarrives.Deletee-mailswhicharenotrequiredforfuturereference(largevolumesaretakenuponserversthroughstaffnotdeletinge-mailsandtheirattachments).Etc.–allcommonsenseguidelines,butoftencommonsenseisn’tcommon!Slide11.34Personale-mail–thePhones4Ucase1Phones4UbecamethefirstUKcompanytobantheuseofinternale-mailacrosstheentirebusiness.Thiswaspartlyasaresultofuseofe-mailforpersonalpurposesandpartlyduetothemanagementfeelingothermethodswerebetterforinternalcommunication.ComputerWeekly(2003)claimedthatthemovewillsaveeachemployeethreehoursaday,addingupto£1mpermonth.Surprisinglythearticlereportedthatwith‘13,000internale-mailspassingthroughitssystemeveryweek,individuale-mailaccountsweretakinguptoomuchoftheITdepartment’stime,thecompanysaid.’CommunicationbetweenPhones4Uheadofficeanditsstoresnowoccursbytelephoneandthecompanyintranet,whichisusedfororderingequipmentandservices,isalreadyshowingpositiveresults.ThemovewasinstigatedbyJohnCaudwell,thecompany’smulti-millionaireowner,whobelievedhis2,500staffhadbeenspendingtoomuchtimesendingandreceivinge-mailsandnotenoughtimedealingfacetofacewithcustomers.Slide11.35Personale-mail–thePhones4Ucase2JohnCauldwell‘IsawthatemailwasinsidiouslyinvadingPhones4UsoIbanneditimmediately,’hesaid.‘ManagementandstaffatHQandinthestoreswerebeginningtoshowsignsofbeingconstrainedbyemailproliferation-thebanbroughtaninstant,dramaticandpositiveeffect.Phones4Ustaffhavebeentoldtogetoffthekeyboards,getface-to-faceoronthephonetocolleagues.’Itdoesn’tseemasifallcompanieswillfollowsuit;CharlesDunstone,chiefexecutiveofrivalCarphoneWarehouse,said:‘Wetrustourpeopletoknowhowtouseemailproperly.’Slide11.36Policyformanagingemployeee-mailuseTominimisethisproblemandsomeoftheproblemsofover-usinge-mailforbusinessuse,thefollowingstepscanbetaken:Createwrittenguidelinesdefiningthepolicyonacceptablee-mailuseanddisciplinaryproceduresforwhenguidelinesarebreached.Useincreasinglevelsofcontrolorsanctionsforbreachesincluding:performancereviews,verbalwarnings,removalofe-mailprivileges,terminationandlegalaction.Providingtrainingforstaffonacceptableandefficiente-mailuse.Monitore-mailsforsignaturesofpersonaluseandanybreachesofthepolicy,e.g.swearingandtakeactionaccordingly.Slide11.37Litigationduetoe-mailAwell-knownexamplefrom2000involvedastatementmadeontheNorwichUnionHealthcareinternale-mailsysteminEnglandwhichwasdefamatorytowardsarivalcompany,WPA.ThestatementfalselyallegedthatWPAwereunderinvestigationandthatregulatorshadforcedthemtostopacceptingnewbusiness.Thepostingwaspublishedontheinternale-mailsystemtovariousmembersofNorwichUnionHealthcarestaff.Althoughthiswasonlyonaninternalsystem,itwasnotcontainedandbecamemorewidespread.WPAsuedforlibelandthecasewassettledinanoutofcourtsettlementwhenNorwichUnionpaid£415,000toWPA.Despitethis,suchcasesarerelativelyrare.SeealsotheClaireSwires‘Swallowing’e-maildialoguewhichledtoseveralstaffdismissalsforreputationaldamage.Slide11.38TypicalISservices1
Helpdesksupportforuserproblems.Thesearetypicallyproblemswithhardwareorusingsoftware.AnindicationofthetypesofproblemsfacedbyusersisintheResearchInsight–PressDeleteforITTimeWasters.Mostqueriesseemtobeaboutapplyinghardwareandsoftwareratherthaninformationmanagement.2
Adviceonsoftwarepurchase.Thisensuresthatthesoftwareissuitableforitspurposeandiscompatiblewithhardware,othersoftwareandcompanypurchasingschemesandstandards.3
Adviceonhardwarepurchase.Thiswillusuallybeacentralisedstandard,againtotakeadvantageofdiscountsandlimitingsupportcontracts.4Adviceonhowend-userdevelopmentshouldbeapproached.Thesupportpersonwillsuggestthebestapproachesfordevelopingsoftware,suchasfollowingthemainpartsofthelifecycledescribedinChapter7.ThesecanbesupportedthroughmoredetailedtrainingandadviceonhowtouseapplicationsbuildingsuchasVisualBasicwhichareintendedforend-userdevelopment.5Applicationdevelopment.Forlargersystems,theICstaffmaybeinvolvedinperformingthesystemsanalysisanddesignormoredifficultaspectsoftheprogramming.6Training.Inparticular,onpackagesordevelopmenttechniques.7Datamanagement.Managementandsupplyofdatatoend-usersorexplanationsofformatsused.Slide11.39PressDeleteforITtimewasters1ITstaffwasteanaverageof20hoursamonthsolvingsimpleproblemsthattoday’sofficeworkersshouldbecomputerliterateenoughtodothemselves,accordingtolatestresearchfromComputerPeople,theUK’sleadingITrecruitmentconsultancy.Whyisn’tmymonitorworking?Myprinter’sjammed-canyoumakeitprintproperly?Whycan’tIsendanymoreemails?Pleasecouldyouformatthisforme?Whywon’titletmesaveontoafloppydisk?
Butwheredoesresponsibilitylie?Slide11.40Problemssuchastheseareusuallyeasilysolvedand86%ofthetimetheydon’trequireITsupport.However,64%ofITprofessionalsaresurprisedathowoftentheyarecalledouttolookat‘broken’monitorsonlytofindtheyaren’tpluggedin,52%claimthattheyareregularlyaskedtoun-blockpaperjamsinprintersand54%areoftenaskedtochangetoners!46%ofITprofessionalssaytheyarerepeatedlyquestionedbyemployeeswhohavesimplyrunoutofstoragespaceone-mail,eventhoughthiscanbeeasilyavoidedsimplybydeletinge-mailsregularly.35%ofsupportstaffdespairedatthosewhodidn’ttakethedisklockoffbeforetryingtosavedocuments.
CaroleHepburn,CommercialDirectorforComputerPeoplesays,‘Inthisageoftechnologythereisnoexcuseforofficeworkersnotspendingacoupleofminutestryingtothinkthroughtheproblem,ratherthanbeingtooquicktopickupthephoneandcallforunnecessaryhelp.TheamountoftimeITprofessionalsspendeachmonthsolvingthesimpleproblemsthattoday’sworkersshouldbeabletodothemselvesisequivalenttonearlythreeworkingdays.’PressDeleteforITtimewasters2Slide11.41PressDeleteforITtimewasters3ComputerPeople’stoptipstohelpITprofessionalswhenthosearoundarefrettingabouttheircomputerproblems:SendweeklyTopTips–Anexcellentwaytonotonlyletallthecomputerusersintheofficeknowhowtosolveanysimpleproblemsthatmayarise,butalsotopassontimesharingshortcutsyoumayhave.Alwaysappearwillingtohelp–Don’tforgetthisiswhatyouaretrainedin!Thoseneedinghelparen’t,sotrytobeaspatientandhelpfulaspossibleeveniftheproblemisverysimple.Keepcalmandbereassuring–Ifamajorpredicamentoccurs,theworkermaypanicandshowdistress.Tohelpcalmthemdown,givelotsofreassuranceandkeepcalmyourself.Talkinnon-technicallanguage–Therewillbeafarbetterchanceofworkersunderstandingwhattheproblemisandhowitcanbeavoidedinthefutureiftheyunderstandwhatyouaresaying.
Slide11.42End-us
温馨提示
- 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
- 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
- 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
- 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
- 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
- 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
- 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
最新文档
- 人事务工合同样本
- 中外技术项目合作合同样本
- 增强花艺设计能力的措施试题及答案
- 儿科设备采购合同样本
- 农业公司购销合同样本
- 养殖梭鱼苗批发合同样本
- 书稿自费出版合同样本
- 写字楼停车位月租合同样本
- 供润滑油合同样本在
- 公司房产抵押合同样本
- 英语课堂游戏PPT-连词成句搭桥游戏
- 人类应不应该限制人工智能的发展辩论赛正方辩词一辩、二辩、三辩、四辩发言稿
- Unit5Poems单元整体教学设计-高中英语人教版(2019)选择性单元整体教学设计(视频课件教案)
- 高中英语高考词性转换汇总(5类词形转换、7组核心词汇转换)
- 非暴力沟通 情绪篇
- 氢氧化钙化学品安全技术说明书
- 2023-2024学年福建省晋江市南安市小学语文六年级期末高分题附参考答案和详细解析
- 医保应急处理预案制度
- 人民医院整形外科临床技术操作规范2023版
- 实验一 显微镜的使用及微生物形态的观察
- 油井调剖技术参考资料
评论
0/150
提交评论