Вы находитесь на странице: 1из 13

MIB

Report - Individual

Maldives Customs
Service
[Type the document subtitle]
ICBT
[Pick the date]

[Type the abstract of the document here. The abstract is typically a short
summary of the contents of the document. Type the abstract of the document
here. The abstract is typically a short summary of the contents of the
document.]

BM 44

Page 0

MIB

Report - Individual

Acknowledgement

BM 44

Page 1

MIB

Report - Individual

Executive Summary

BM 44

Page 2

MIB

Report - Individual

Table of Contents
Acknowledgement..........................................................................................................i
Executive Summary.......................................................................................................ii
List of Illustrations.........................................................................................................1
1.0 Introduction..............................................................................................................2
NEW TRENDS OF INFORMATION TECHNOLOGY IN THE MARKET................3
1.1 E-Commerce........................................................................................................4
1.2 Big Data..............................................................................................................5
1.3 Cloud Computing.................................................................................................5
2.0 Information rights, ethics, security management and risk managment....................8
2.1 Information rights.................................................................................................8
2.2 Understanding Ethics & Rights............................................................................8
2.3 Managing Security Related Information System.................................................9
2.4 Managing Risk Related IT System.......................................................................9
3.0 Issues related to company information systems.....................................................10
3.1 Software Related Security management Issue...................................................10

List of Illustrations

BM 44

Page 3

MIB

Report - Individual

1.0 Introduction
Maldives customs was establish on the date of 1890. The first head of customer service
person is Amir Ahemd Dhoshimeyana Kilegefaanu. Customs service is currently lead by
Mr,Ibrahim Shareef Mohamed he is the Commissioner General of Customs.
Maldives customs service is working in the frontline in helping the government of
Maldives to protect the borders and revenue in order to provide safety environment for
the people while actively participating in the global community. Customs take
responsibility of multi-functional role with responsibility for social, economic and
environmental protection, security of the supply chain, and facilitation of trade at the borders.
Customs today is challenged within creased volume of traffic, with no corresponding
increase in resources and greater expectations from traders for faster clearance times.
The Government and society expect Customs to provide effective controls on our
borders.
Customs supports the objectives of a number of government agencies at the border, and
works with groups of agencies towards shared objectives. Customs is heavily depending
on the information technology due to the nature of the work. There are over 100 staff
working in customs who are specialized in information technology. Custom has the second
large work force of information technology in Maldives.
Vision
To become a world class Customs service that fully reflects national and international
standards and best practices, in contributing to border protection and trade facilitation.
Mission
To guard and protect the Maldives national borders from smuggling of narcotics, contrabands
and against other illegal cross-border activities, by steadfastly enforcing the laws of the
Maldives while fostering economic security through facilitation of legitimate trade and travel.

BM 44

Page 2

MIB

Report - Individual

NEW TRENDS OF INFORMATION TECHNOLOGY IN THE MARKET


21st century has been defined by application of and advancement in information technology.
Information technology has become an integral part of our daily life. According to some
information technology geeks, information technology is demarcated as the study, design,
development, application, implementation, support or management of computer-based
information systems.
Information technology has served as a big change agent in different aspect of business and
society. It has proven game changer in resolving economic and social issues.
Information technology has helped to make possible the development of various Business
techniques, thus enabling a more resourceful distribution of the data that are essential to
business success. These advances have equipped managers with better-quality tools to
interpret available customer and product data and use this information as part of their
considered planning.
Advancement and application of information technology are ever changing. Some of the
trends in the information technology are as follows:

BM 44

Page 3

MIB

Report - Individual

1.1 E-Commerce
The term "Electronic commerce" (or e-Commerce) refers to the use of an electronic medium
to carry out commercial transactions. Most of the time, it refers to the sale of products via
Internet, but the term e-Commerce also covers purchasing mechanisms via Internet (for B-ToB).
A client who purchases on the Internet is called a cyber consumer. E-Commerce is not only
limited to online sales, but also covers:

Preparation of estimates online


Consulting of users
Provision of an electronic catalog
Access plan to point of sales
Real-time management of product availability (stock)
Online payment
Delivery tracking
After-sales service

In certain cases, electronic commerce makes it possible to highly customize products, in


particular when the electronic commerce site is linked with the production system of the
enterprise (e.g. business cards, customized items such as T-shirts, cups, caps, etc.)
Finally, insofar as electronic services and products are concerned (MP3 files, software
programs, e-books, etc.), electronic commerce makes it possible to receive the purchase in a
very short time, if not immediately.

BM 44

Page 4

MIB

Report - Individual

1.2 Big Data


Big data is data that exceeds the processing capacity of conventional database systems. The
data is too big, moves too fast, or doesnt fit the strictures of your database architectures. To
gain value from this data, you must choose an alternative way to process it.
The value of big data to an organization falls into two categories: analytical use, and enabling
new products. Big data analytics can reveal insights hidden previously by data too costly to
process, such as peer influence among customers, revealed by analyzing shoppers
transactions, social and geographical data. Being able to process every item of data in
reasonable time removes the troublesome need for sampling and promotes an investigative
approach to data, in contrast to the somewhat static nature of running predetermined reports.
1.3 Cloud Computing
Cloud computing refers to the delivery of computing resources over the Internet. Instead of
keeping data on your own hard drive or updating applications for your needs, you use a
service over the Internet, at another location, to store your information or use its applications.
Doing so may give rise to certain privacy implications. When you store your photos online
instead of on your home computer, or use webmail or a social networking site, you are using
a cloud computing service. If you are an organization, and you want to use, for example, an
online invoicing service instead of updating the in-house one you have been using for many
years, that online invoicing service is a cloud computing service. Cloud computing is a
model for enabling convenient, on-demand network access to a shared pool of configurable
computing resources (e.g., networks, servers, storage, applications, and services) that can be
rapidly provisioned and released with minimal management effort or service provider
interaction. The cloud service models defined as there. Those are:

Characteristics

Service models

Deployment of cloud services

For the organization which I have selected for this assignment is Maldives Customs Services.
This assignment is based on the role of information technology in the operations of Maldives
custom service. Interview with different departments of custom enable to understand the
information technology infrastructure and how well the custom optimize the use of
information technology. The involvement of management and operations level staff in IT
related activities and how well it benefited to them. IT contributes to build a good
relationship with the customer and survival of the organization. The integration of IT within
BM 44

Page 5

MIB

Report - Individual

custom and other government agencies and how well the information technology is being
utilized in the strategic decision making is being discussed. And I have found the best option
they can implement within the organization working with cloud computing. The reason why I
am suggesting them this option is based on the interview which I had with the department
heads. The main concern of them totally fall on missing needful data. In the interview most of
the departments heads shown their concern for keeping needful datas in a safe and easy
access. Therefore, cloud computing can be the one of the best options for this identified issue
and the following are the advantages and risk when using cloud computing.
Why Cloud Computing is Recommended and how it Benefits to the Organization.
As discussed earlier, Maldives Customs Service do concern about the ease of access to their
Datas and Training on their staffs, cloud computing will be the easiest and best option to get
over from that hassle. The reason why I have recommended cloud computing is as follows:
1.

Fresh Software

The latest versions of the applications needed to run the business are made available to all
customers as soon as theyre released. Immediate upgrades put new features and functionality
into workers hands to make them more productive. Whats more, software enhancements are
typically released quite frequently. These is in contrast to home grown or purchased software
that might have major new releases only once a year or so and take significant time to roll
out
2.

Can do more with less

With the cloud computing, Customs Service can reduce the size of their own data centers or
remove their data center footprint altogether. The reduction of the numbers of servers, the
software cost, and the number of staff can significantly reduce IT costs without impacting an
organizations IT capabilities.

BM 44

Page 6

MIB
3.

Report - Individual
Flexible costs

The costs of cloud computing are much more flexible than any other methods. Custom
service only need to commission and thus only pay for server and infrastructure capacity as
and when it is needed. More capacity can be provisioned for peak times and then deprovisioned when no longer needed. Traditional computing requires buying capacity
sufficient for peak times and allowing it to sit idle the rest of the time.
4.

Always-on availability

Most cloud providers are extremely reliable in providing their services, with many
maintaining 99.99% uptime. The connection is always on and as long as workers have an
Internet connection, they can get to the applications they need from practically anywhere.
Some applications even work off-line.
5.

Improved mobility

Data and applications are available to employees no matter where they are in the world.
Workers can take their work anywhere via smart phones and tablets roaming through a retail
store to check customers out, visiting customers in their homes or offices, working in the
field or at a plant, etc.
6.

Improved collaboration

Cloud applications improve collaboration by allowing dispersed groups of people to meet


virtually and easily share information in real time and via shared storage. This capability can
reduce time-to-market and improve product development and customer service.
7.

Cloud computing is more cost effective

Because companies dont have to purchase equipment and build out and operate a data center,
they dont have to spend significant money on hardware, facilities, utilities and other aspects
of operations. With traditional computing, a company can spend millions before it gets any
value from its investment in the data center.
8.

Expenses can be quickly reduced

During times of recession or business cut-backs (like the energy industry is currently
experiencing), cloud computing offers a flexible cost structure, thereby limiting exposure.

BM 44

Page 7

MIB
9.

Report - Individual
Flexible capacity

Cloud is the flexible facility that can be turned up, down or off depending upon
circumstances. For example, a sales promotion might be wildly popular, and capacity can be
added quickly to avoid crashing servers and losing sales. When the sale is over, capacity can
shrink to reduce costs.
information rights to the Employees
Maldives customs Service have some strict rules to provide the information related to their
works. For an example: when I went to interview some staffs on regard of this survey of mine
and when I requested the staff to explain me how to do the clearance of some imported goods
from custom bonded ware house, he replied me that he cannot give me that information
without the knowledge of associated department. this means even if the staff knew about the
procedure, he is restricted by rules to give me that information since the information is not
related to his department so Maldives customs service have some strict rules on providing
work related informations.

2.0 Information rights, ethics, security management and risk management


2.1 Information rights
Maldives Customs service have some rules on providing informations about them. In the
staff contract, there was a clause mentioning any information related to the internal works of
Maldives Customs Service cannot provide without the knowledge of their legal department. if
any have provided such information without legal departments consent, than the staff will be
fired immediately without prior notice. This rules have endorsed by the law of Maldives.
2.2 Understanding Ethics & Rights.
It is very important to understand the ethics and rights working in IT
Industry. If the staffs do not have the these know how, then the company
will face the following problems which it will effect whole company.

BM 44

Hackers can access easily to the data.

Possible loss of data and related informations.

Losing work related Public Reputation.

Page 8

MIB

Report - Individual

2.3 Managing Security Related Information System.


There are a number of enterprises focused to the ascendancy and structural issues of securing
information systems having in mind that it is business and organizational problem, not only a
technical problem. Information technology security administrators should expect to devote
approximately one-third of their time addressing technical aspects. The remaining two-thirds
should be spent developing policies and procedures, performing security reviews and
analyzing risk, addressing contingency planning and promoting security awareness.
2.4 Managing Risk Related IT System.
Risk management must be a priority for leadership and throughout the program's
management levels. Maintain leadership priority and open communication. Teams will not
identify risks if they do not perceive an open environment to share risk information
(messenger not shot) or management priority on wanting to know risk information (requested
at program reviews and meetings), or if they do not feel the information will be used to
support management decisions (lip service, information not informative, team members will
not waste their time if the information is not used.)

BM 44

Page 9

MIB

Report - Individual

3.0 Issues related to company information systems


3.1 Software Related Security management Issue
In an information system, there is so much security related issues that the industry have to be
very concerned. As the government want to offer increasingly sophisticated Web-based
services. To get online as fast and as cheaply as possible, as many organizations are using, or
thinking of using, outsourced software development services. There are plenty of
benefits to outsourcing software development: access to skilled developers,
flexibility and scalability, cost savings, and increased speed to market. However, software
written by a third party can introduce unacceptable levels of risk in the form of security
threats and vulnerabilities. The cost of ensuring the final application is secure, and the
organizations information assets remain protected, can have a significant impact on the
overall cost. In this tip, we'll look at the key controls to put in place to get the most out of the
benefits of outsourcing without incurring unforeseen costs or risks. Some of the Risks are:
1- Assessing applications at risk
2- Reviewing partners security capabilities
3- protection of data
4- unbiased verification and validation

BM 44

Page 10

Вам также может понравиться