Introduction
Defense intelligent agency was mandated during its establishment in the year 1961 to be the centralized intelligent manager for the defense department. It, therefore, performs its duties to support the required report to the joint chief staff, the defense secretary, policy makers and the policy makers (Malaga, 2005). The main advisor of this organization is the director the organization structure is as shown in in the flow chart. In fig 1.1
One of the missions of the agency is delivering intelligent products from multiple sources, applications, resources, and services. It also supplies IO forces and skilled personnel in the related fields of informational warfare, controls and command warfare, acquisition, security, technology, and foreign weapons systems and monitoring of treaties ("15th IEEE International Conference on Network Protocols," 2007). This is done with the aim of supporting major commands in the air force, joint air components, and national legislature or decision makers. In operations of information, AIA acts in the position of eighth air force deputy commander. The eighth air force is the first operation force that was designed by air force having the capabilities of bomber and IOs. It was designed for maintaining superiority in information.
The security measures address both protecting and disseminating information. Intelligence needs protection. Intelligence, especially those that are sensitive, should be protected unless for commanders who require them for effective combats and those that might place friendly forces from being the attack in danger. The decision must be made early enough concerning releasing the intelligence ("2005 First Workshop on Secure Network Protocols (NPSEC)," 2005). This balances the requirement operations while maintaining the need for protecting sources and sensors.
Traditionally, direct patient care has been supported by their data in healthcare. Such data can be combined together with the patient's genetic information so that they can better decisions for therapy and diagnosis and used secondarily for data mining. Although it appears difficult to achieves, because of commercial, technical and legal issues that are associated with refining and combining patient's data ("Internet Protocol and Related Protocols," 2002). Major catalysts in clinical practices that enable the evidence-based medicine are the Clinical Decision Support Systems (CDSS). CDSS can have patient's data as its base but in most cases, they are dispersed among heterogeneous sources of data.
Integration and then data mining must take care of codification of patient's data with the terms of the system that are additional to ethical and side of using data. Although for a longer period of time, the process of computerizing the patient's data has been going on going on for a period of time. An investigation concerning the feasibility of using the patient's record electronically (EPR) as sources of data for data mining is crucial (Medhi & Ramasamy, 2018). Sometimes rules of associations might act as bases for CDSS. The usability and possibility of a system to explain the advanced generated id affected by logic representations. It is a bit easier to explain a number of characteristics of these rules which will improve the confidence of end users.
Information obtained in other sources apart from EPR are important in making diagnosing and treating decisions. The process of drug prescriptions depends on reliable information concerning the drug-drug interactions which if not taken care well has serious effects. CDSS together with other information becomes useful only when they are available at the patient's location and at the right time. CDSS using mobile is therefore motivated (Open Systems Interconnections (OSI) Model, 2011). Representation of structures can be done using category the theory of categories based on rough sets implementation.
CDSS and Guidelines for development are laid upon the already existing guidelines that have the connection to external information systems that adds values to recommendations once the situation of a particular patient is known. Although CDSS is in a position to improve health care's efficiency and quality, they must be connected well with the already existing ones. Workflow of the workflows are managers of the physical resources like doctors and patients (Mora, 2012). It can help in the process of standardization of care processes and support the decision of the management through simulation of workflows.
It is feasible economically to use patient's genetic information to personalize medicine, this increases computational requirements. Computational distributions through the web services and workflows that are oriented to the system can substitute human-oriented workflows. Ta hemodynamic issues and delivery of services (Glandon, Smaltz, & Slovensky). Dynamic service discovery, services inputs and outputs, and semantic annotations have effects on the feasibility of systems-oriented workflow how they are shared and constructed.
The information system can be considered to be a set of interconnected components for collecting, storing and processing data while the other digital products. The organization depends on information systems for management of operations, make interactions between customers and supplies and place themselves well on the marketplace for competition (Burd, 2011). The information system has quickened the pace of each day's activities, people maintaining while establishing other new relationships in social and economic activities.
As computers are becoming more and more essential to people and companies, also there is a constant increase in attack threats. In order for these computers to be used confidently, there must be an assurance that they shall not be compromised in whatever way (Loshin, 2003). This calls for the fundamentals of information systems security and possible measure that can be adapted in mitigation of these threats. There are measures that can be adapted by companies while others that can only be employed by individuals on their PCs.
Firewall is used by organizations to beef up security on their networks. They exist either as hardware or software (or even both). A firewall in hardware form is a peripheral device that is normally connected to the network and acts as a filter to the packets based on certain specified rules. On the other hand, a firewall existing in software forms runs on the operating systems to make arriving packets intercepted. Firewalls protect the company's both servers and computers by shielding the company's packets from those that do not belong to that network or does not meet certain criteria.
Firewalls can also be implemented in multiple numbers to provide security configurations by creating more than one sections that might be secured partially. This type of network security is referred to as DMZ, meaning demilitarization zone. A term that borrowed from the military. In most cases, it is a place that organization places resources that have to be secured yet have to be accessed. A network diagram is a diagram that virtually represents a computer network to some extent it might also represent a telecommunication network (Matyjas & Hu, 2016). It gives a description of components that make up a network and the interaction of these components. The simplest network diagram is that of a local area network (LAN) and might either be a logical or a physical network. Figure 1.2 below is a representation of a network diagram.
Information system hardware is the physical, tangible and peripherals devices that make up a computer system while on the other hand, software components of a computer system are the coded programs that make a computer to function (Sanchez, Villalobos, Deridder, & Jonckers). Standardization is the situation where a third party comes in between the hardware and the software to impose conditions on agreement or understanding so that the products to be produced at different sides of the world shall have to interact and all shall be interoperability. In the ICT industry, there are several standards that have emerged to develop and monitor ICT standards.
Standards for internet are developed by World Wide Web consortium, International Standard Organization (ISO) up to currently has managed to develop more than 14 000 standards. Standards alwaystakes care of operability issues. With theever-improvingg technology, it has become difficult to monitor the development of ICT components (Esparza, Grumberg, & Sickert, 2016). This means that hardware's and software are emerging every now and then without being monitored or due to the high number of standards, there are a lot of standards that are no longer compatible with each other. Open system interconnection is a point of reference how applications make communications with networks. It has a main aim of interoperability since it leads vendors and developersinocreatingg products and software's that interacts freely with one another.
Transmission control protocol/internet protocol (TCPIP) is a group of communication protocol that interconnects devices on the network to the internet to match communication and can be used to extended communication to a private network, that is extranet and internet (In Serebrenik, In Cleve, & In Mens, 2014). The communication rules and conventions between different devices are defined by network protocols. They alsoincludes mechanisms through which devices recognises each other and make connections to them.
References
15th IEEE International Conference on Network Protocols. (2007). 2007 IEEE International Conference on Network Protocols. doi:10.1109/icnp.2007.4375823
2005 First Workshop on Secure Network Protocols (NPSEC). (2005). 1st IEEE ICNP Workshop on Secure Network Protocols, 2005. (NPSec). doi:10.1109/npsec.2005.1532040
Burd, S. D. (2011). Systems architecture: Hardware and software in business information systems. Boston, MA: Course Technology, Cengage Learning.
Esparza, J., Grumberg, O., & Sickert, S. (2016). Dependable Software Systems Engineering. s.l: IOS Press.
Glandon, G. L., Smaltz, D. H., & Slovensky, D. J. (2014). Information systems for healthcare management.
In Serebrenik, A., In Cleve, A., & In Mens, T. (2014). Evolving Software Systems. Berlin, Heidelberg: Springer Berlin Heidelberg.
Information technology. Open systems interconnection. Basic reference model. Conventions for the definition of OSI services. (n.d.). doi:10.3403/00527826
The Internet Protocol and Related Protocols. (2002). The ABCs of TCP/IP. doi:10.1201/9781420000382.ch4
Loshin, P. (2003). Thinking about Internet Application Protocols. TCP/IP Clearly Explained, 309-317. doi:10.1016/b978-155860782-8/50018-x
Malaga, R. A. (2005). Information systems technology. Upper Sad...
Cite this page
Paper Example on Information Systems Technology. (2022, Sep 23). Retrieved from https://midtermguru.com/essays/paper-example-on-information-systems-technology
If you are the original author of this essay and no longer wish to have it published on the midtermguru.com website, please click below to request its removal:
- Parents Monitoring their Children on the Internet - Essay Example
- Project Vision Document: My Health Record - Paper Example
- Digitalization in Business - Essay Example
- The Internet Revolution: A New Era of Social Interactivity - Essay Sample
- The Inventor of the World Wide Web: Tim Berners-Lee - Essay Sample
- Secure Your Wireless Network: Protect Against Data Intruders - Research Paper
- The Internet of Things: Revolutionizing Industrial Automation and Monitoring - Essay Sample