Picture
With the available choices on the placement information systems in organization, it would just boil down to the willingness and ability of the organization to allocate resources on the matter. Time, money, people, and efforts are all at stake in this matter.

It is up for the organization to plan cautiously the creation and development of their information system. While it is ideal that from the start system engineering be in place, it also entails high expenditure. And with the presence of pre-packaged systems, it is hard to weigh the options especially that these pre-made systems have advantages of their own like being made by certain vendors specializing in making systems in different fields like Oracle, IBM, and others. The problem posed by patronizing the pre-packaged systems is vendor-dependence. And when different vendors of systems are incorporated in ones organization, consolidation and merging of all these systems will be difficult – as what most companies nowadays are experiencing.

Of course, the organization wants what is best for it and therefore would exert all necessary measure to invest on what it deemed necessary- and in reality, information system is not that given much priority as to this.

Information is vulnerable in every way no matter where you look at it. There will always be a loophole or more on the security and safety of information. What organizations can do is to increase safeguards – human and technical. Human safeguards are, by the lines, measures of training and preparing people in different situations to protect information. Directly, endusers are the ones involved – may they be frontliners, managers or even executives. As counterpart of the human measures, there are also technical measures to ensure the safety and security of information. From the basic passwords and individual authority limits to as complex are firewalls and virus protection applications. When both these human and technical measures are in place, it is less likely that the information system in ones organization is at risk.



 
Picture
In the Philippines, there is a weak law, or rather none, regarding security and safety of information in the internet. In some countries like the USA, there are laws protecting information on the internet. They can even trace and act upon internet piracy such as torrents.

The problem with information security for us is that there are still less people in our country who are skilled enough so as to secure information. Just look how individual hackers infiltrate government sites and other sites. This proves how weak our safety and security is. Well that seemed to be a hash conclusion but it is. Data and information are somehow intangible assets that can only be contained and not fully substantiated. This is the problem why there are many threats to information security.

First, being open to the Pangaea of the virtual realm, there are threats to attacks of viruses, spywares and malwares. Second, being technically “open for all”, ownership and rights issues are at stake. Third, being vulnerable to hacks and alteration, safety and security is jeopardized.

The digital era of course do not let these threats get to its downfall, all these have temporary to permanent solutions. Tools such as antivirus applications and other protection programs have been created and are continually being updated of the definitions of current viruses, malwares and spywares. As for the ownership and rights issues, this matter has been addressed temporarily. There are some sites that restrict lifting from their site but as to a solid law and technology on how to trace ownership, there is a weak development. And as for the third, since people are the ones who created and developed these information systems, there are always ways that people can also break into these systems.