Reflective Essay
Student Name:
Student ID:
Introduction
This essay is a self-evaluation of the development of my progress in the “Information management and control” academic course in which I am now pursuing in. The topics I propose to discuss are including how my learning experiences were, my feelings and thoughts about them, and reflection on my future behavior and actions, my progress and awareness of aspects that require to get addressed in my education, the level of essential transportable ability advancement, a summary of discussions with my self-improvement, and difficulties relating to my personalized lessons. Finally, opportunities for future growth will be highlighted, along with recommendations on how to handle these, each of them will contribute to both personal and professional advancement. People may spend a large quantity of effort pondering about past events and forthcoming responsibilities. However, this method claims that through the progress, similar thoughts should be translated into directed reflection, enabling individuals to improve them in the long term. The main purpose of reflective practice is for the professional to be able to perceive, comprehend, and benefit from his or her actual experiences so, as just a result, to undertake “consistent activity toward building growing efficiency within the framework of what is recognized as desired practice.”
Personal reflection
Like a senior learner with extended opportunity knowledge, I thought I had mastered self-discipline, which is crucial for effective learning. As the globe has accelerated due to digital information, it has become the primary fuel for pushing the worldwide industry. The vast volume of data produced by social media applications adds to the richness and complexity of information management. The first session taught me the fundamentals of information management, which piqued my interest and provided me the courage to continue. I learnt more about it during meetings with other students in my group. And witnessed democratic leadership, in which team members assist one another in thoroughly understanding the topic. I and another team member took on the position of leader to showcase it further, with the rest of the team joining in. I felt secure in my vocal communication as a leader to better demonstrate my other teammates.
Information government actions, processes, and methods strive to assist information management by providing support for regulatory, legality, functional, and administrative risks in order to obtain optimum advantage while reducing hazards. Senior management and information professionals are in charge. And information management governs the flow of data (White, 2020). The most significant aspect of both is the people. When we discussed it in our group, we disagreed on whether information should be managed by the company because good information dar allows workers to stay focused on corporate goals, make better informed decisions, and work smarter, not harder. In this regard, we compete. And, in the end, there was no win-win situation. It is a competing element of value framework theories (Smallwoood, 2019).
During this program, I progressively improved my communicating skills, knowledge acquisition, cooperation, and information technology skills. By reading more facts, I may improve my ability to locate, recognize, and retrieve information from a variety of sources and forms, as well as develop my vocabulary and communication abilities.
Future action
As we become increasingly vulnerable to current technologies, information security concerns such as malware infections, IoT threats, cloud intrusions, phishing scams, cryptocurrencies and blockchain assaults become more prevalent. It results in the loss of information, possessions, reputation, and money (Putz et al, 2021). Keeping software up to date, cyber insurance, and the use of automated technologies to guard against breaches are all important. This is the issue on which all team members agreed, and we cooperated according to the values framework, trying to identify various approaches to alleviate the problems of assaults.
Enterprise information management (EIM) is a business discipline that specialises in delivering strategies for the effective use of information inside businesses, such as to assist decision-making activities or day-to-day activities that rely on information accessibility. According to Cybersecurity Ventures, a business was hit by a ransomware assault every 14 seconds in 2019. In 2021, that figure was every 11 seconds. The possibility for damage from disclosing knowledge on a specific individual is referred to as informational risk. IT risk management is the use of risk management techniques to handle IT dangers. IT risk management is identifying and assessing possible threats and vulnerabilities in IT infrastructure using processes, regulations, and technologies. This was another area where our discussions did not result in a win-win situation. Some contended that IT risk management should always be the responsibility of individuals, while others maintained that it should always be the responsibility of enterprises. We competed and battled over value frameworks once again.
Formally, informally, and technically, information systems can be regulated. Auditing assesses system control. IT audits verify whether IT controls safeguard corporate assets, preserve data integrity, and are aligned with the broader goals of the organisation. We debated and decided as a team that strategic leadership styles may be used in the business. The deep web is a subset of the World Wide Online whose contents are not searchable by ordinary web search engines. The dark web is the WWW material found on darknets, which are overlaying systems that utilise the Net but need particular software, setups, or authorisation to access. This programme taught me the distinction between the deep and dark webs. And our conversation was quite beneficial (Basheer & Alkhatib 2021).
An IT audit is required to guarantee that the system is secure and not exposed to assaults. An IT audit’s major goal is to assess the accessibility of computer systems, the safety and privacy of data within the program, and if the system is correct, trustworthy, and efficient. COBIT (Control Goals for Information and Related Technologies) was created as a set of IT control objectives to assist the financial audit community in navigating the growing complexity of IT systems. Our interactions were collaborative, and we attempted to think of alternative ways to support financial auditing better than previously. Transformational leadership might be maintained in this instance.
The fourth revolution is digital transformation, which burdens this industry with more information while also putting it at danger. Adapting to change may help you better serve your consumers and boost the value of your brand and products. It is all about meeting consumer requirements, developing new abilities, innovating, and adapting to changes. The conversation on digital transformation should be collaborative. Change cannot be brought about by one person alone. Visionary leadership is required.
Organizations establish a code of professional ethics to remind employees of their obligations. One should avoid causing harm to others or interfering with or snooping on other people’s files by using a computer. Cyber law, criminal law, civil law, and company law all have an impact on information management. This section raised several difficulties, including security responsibility, access cost, digital ownership, patents, trade secrets, trademarks, and copyright. In terms of ethics, we agreed that bureaucratic leadership will be beneficial to the various leadership types.
An organisation must have information systems in order to exist and thrive. Employees pose the biggest risk. Stopping information leaks requires developing a security-focused culture and creating a secure environment for information through understanding, teamwork, displaying good values, and being transparent about security. Another topic where the discussion devolved into a heated debate. I lost control of it. Should the company seek external assistance or must rely on internal resources? Situational leadership should be applied in this case.
I would like to continue developing my technological ability in order to expand my knowledge and abilities. This will be accomplished via practise and self-directed learning. This will aid in the future development of my abilities and expertise, as well as my comprehension of the practice area. I will improve my active listening abilities in order to grasp what my felloe mates were attempting to say at the time. I will develop my active listening skills to understand what my fellow mates were trying to said at the moment when we ended upon a heated argument. By acknowledging every one’s decision, I can make decisions that can benefit all and give respect all and it could improve my collaborative nature.
Conclusion
Finally, I demonstrated how my knowledge developed from basic to skilled. I also wish to maintain my personal and professional development by regularly engaging in events of learning and expanding my career plan. Furthermore, I intend to keep learning in order to be properly equipped to face professional challenges, notably in making decisions and the ability to recognise and maximize on chances, IT audits, and information security risks. As an IT student, I completely understand and I am totally confident in the profession which was chosen. I want to regard learning as an integral part of my identity; gaining new skills every day is a lifetime adventure for me. Reflective practise will not only increase the quality of my service but will also assist me to grow personally and professionally, allowing me to bridge the difference between theory and practise.
Get expert help for Information Management & Control Assignment and many more. 24X7 help, plag free solution. Order online now!