OtherPapers.com - Other Term Papers and Free Essays
Search

Information System Technology and Security

Essay by   •  August 8, 2011  •  Essay  •  760 Words (4 Pages)  •  1,095 Views

Essay Preview: Information System Technology and Security

Report this essay
Page 1 of 4

Abstract

This paper will describe the vital role of information systems, and the recognition that information systems are a critical resource in doing business. Information security will require that management act to secure information resources. Success primarily depends on management's position, the existence of an information security protocols to prevent breech of information.

Information systems are the foundation for conducting business today. In many industries, survival and even existence without extensive use of information technology is inconceivable, and IT plays a critical role in increasing productivity. Information technology has become more of a commodity, when coupled with balancing changes in organization and management, it can provide the foundation for new products, services, operational excellence and ways of conducting business that provide firms with a strategic advantage.

Business firms invest in information system and technology because they are necessities of doing business. The necessities are driven by industry level changes. Information system technology is moving at rapid pace of constant advancement, which has made it necessary to understand the importance of technology so that we can keep up with the racing time. Technology has become important in the fast life of today. In an ever changing world more and more businesses are engaging in globalization, as inter-organizational collaborative computing increases in importance. Since 1970, companies and public organizations have recognized that the computer is an important aspect of the business; it has the characteristics that have made security problems more complex to solve (SEJONG OH, 2006). In recent years, access control has been considered as an important security factor in management of information systems. Many companies and organizations require access control mechanisms to protect important information effectively (SEJONG OH, 2006).

Security information means protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording or destruction (Dhillon & Backhouse, 2000). Information system control has the common goals of protecting the confidentiality, integrity and availability of information (.http://en.wikipedia.org/wiki/Information_security) Organizations must establish frame work controlling design, security, and use of computer programs (Dhillon & Backhouse, 2000). Management of information systems will need to include hardware, software, computer operations, data security, implementation, and administrative controls. Application controls will include input, processing and out put controls (Dhillon & Backhouse, 2000). Data loss possesses a constant risk for any business that utilizes a web browser interface, which is nearly every

...

...

Download as:   txt (5.5 Kb)   pdf (91.2 Kb)   docx (10.8 Kb)  
Continue for 3 more pages »
Only available on OtherPapers.com
Citation Generator

(2011, 08). Information System Technology and Security. OtherPapers.com. Retrieved 08, 2011, from https://www.otherpapers.com/essay/Information-System-Technology-and-Security/8793.html

"Information System Technology and Security" OtherPapers.com. 08 2011. 2011. 08 2011 <https://www.otherpapers.com/essay/Information-System-Technology-and-Security/8793.html>.

"Information System Technology and Security." OtherPapers.com. OtherPapers.com, 08 2011. Web. 08 2011. <https://www.otherpapers.com/essay/Information-System-Technology-and-Security/8793.html>.

"Information System Technology and Security." OtherPapers.com. 08, 2011. Accessed 08, 2011. https://www.otherpapers.com/essay/Information-System-Technology-and-Security/8793.html.