StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Information Technology and Security - Essay Example

Cite this document
Summary
This essay "Information Technology and Security" is about new information products and services available for use in organizations include teleconferencing, microcomputers, software packages, distributed data processing, automated offices, voice mail, networking, database management systems…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94.4% of users find it useful
Information Technology and Security
Read Text Preview

Extract of sample "Information Technology and Security"

Download file to see previous pages

Information Technology and Security
Introduction
The proliferation of information technology can be overwhelming and the Internet technologies are now seen as staples or natural resources, just like coal, cotton, fish, and so on. Just as a society is conditioned by its reliance on a few staples, so societies are shaped by the communication media they use. The Internet technologies have undeniably affected the way the British act, changing the social organization of everyday life (“Computer Disaster,” 1987). According to security (1992), as technology developed, major businesses and industries were developed. Many laws were made because some individuals took advantage of the growth of businesses and were able to monopolize certain parts of the British businesses (security, 1992).

The rise of Internet technologies can be either awe-inspiring or devastating. In spite of these fantastic improvements in the way British institutions can communicate across expansive distances, certain drawbacks weigh down the splendor of Internet technologies. We are in the midst of an information revolution (“Management Awareness,” 1987). Certain ancillary drawbacks terrorize their information channels as any computer virus, simple or sophisticated, can (Jackson, et al., 2003). These are known by different names but for this, they will be termed as “computer-related crimes”.

This essay will start by charting the evolution of information systems and information technology and then establish the definition of “computer-related crimes”. It will demonstrate how with the advancement in technology crimes too have risen and most often the people entrusted with the system are most likely to commit the crimes. The motives behind the crimes will be discussed and then the countermeasures that have been adopted by the software experts, as well as the government measures, will be discussed.
Computers and technology have become indispensable. Society is dependent on technology in every field. Computer crimes have risen along with technology but certain countermeasures can help to keep the crimes and the criminals under control. However, no society can be free of any crimes, and mishaps and computer-related crimes are just another way of conducting crime.

Evolution of Information system
Phenomenal changes have taken place in industrial communication over the past hundred years. To create a simple document, we have moved from handwriting to typing to word processing. To produce multiple copies of that document by hand to carbon paper to high-speed photocopying machines. To store those documents, we have moved from boxes to file cabinets to floppy disks to CD-ROM to flash disks. To send those documents over long distances, we have moved from stagecoaches to airmail to express mail to facsimile. To exchange messages over long distances, we have moved from messengers to telegraph to telephone to voice mail and electronic mail (Boswell, Simons, and Doswell, 1986). Electronic mail can be used to send simple messages to targeted individuals, to broadcast information to a large market segment, to chat with collaborators across the country or world, or to exchange and revise long and complex documents (“Computer Related,” 1988). The Internet and the World Wide Web can be used to gather relevant technical or policy information, to check on the activities of partners and competitors, to access timely news on a minute-by-minute basis, or to promote the desired image and communicate with customers and constituency through a sophisticated website.

To get together as a group, we have moved from formal meeting rooms to conference calls to video conferencing. To make a decision, we have moved from meetings run by parliamentary procedure to the use of computerized group decision support systems. In short, the industry at the turn of the 21st century bears little resemblance to the industrial operations at least a hundred years ago, and many of these changes we observe are the result of innovations in information technology (Dutton & Peltu, 1996). Decision-making can be enhanced through these information-gathering and communication capacities and through group applications such as video and audio conferencing, computer conferencing, and group decision support systems (“Management Awareness,” 1987).

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“In the world today where much depends upon cooputers and their Essay”, n.d.)
In the world today where much depends upon cooputers and their Essay. Retrieved from https://studentshare.org/miscellaneous/1545484-in-the-world-today-where-much-depends-upon-cooputers-and-their-associated-networks-computer-related-crime-appears-to-be-becoming-a-major-problem-describe-and-analyse-the-range-of-computer-related-crime-based-upon-this-analysis-offer-up-some-effective
(In the World Today Where Much Depends Upon Cooputers and Their Essay)
In the World Today Where Much Depends Upon Cooputers and Their Essay. https://studentshare.org/miscellaneous/1545484-in-the-world-today-where-much-depends-upon-cooputers-and-their-associated-networks-computer-related-crime-appears-to-be-becoming-a-major-problem-describe-and-analyse-the-range-of-computer-related-crime-based-upon-this-analysis-offer-up-some-effective.
“In the World Today Where Much Depends Upon Cooputers and Their Essay”, n.d. https://studentshare.org/miscellaneous/1545484-in-the-world-today-where-much-depends-upon-cooputers-and-their-associated-networks-computer-related-crime-appears-to-be-becoming-a-major-problem-describe-and-analyse-the-range-of-computer-related-crime-based-upon-this-analysis-offer-up-some-effective.
  • Cited: 0 times

CHECK THESE SAMPLES OF Information Technology and Security

Perception of Cyber Bullying

It is for this reason that Information Technology and Security issues become critical.... Hereunder, among many areas encompassing science and technology that have impacted human lives, information technology has stood out.... Indeed, information technology has changed the lives of people across the globe.... information technology has reduced the world to a global village through fostering of advanced forms of communication....
8 Pages (2000 words) Research Paper

Information Technology Security

Name: Tutor: Course: Date: University: Information Technology and Security Introduction CIA denotes confidentiality of information, integrity of information, and availability of information.... The protection of such information as bank account statements, credit card numbers, personal information, government documents, and trade secrets remain a critical part of information security.... SSL/TSL details a security protocol for communication over the internet has overtime been employed, in conjunction with a broad range on internet protocols, to guarantee security (Whitman and Mattord 2012, p....
3 Pages (750 words) Essay

SWOT Analysis of Yahoo Inc

Yahoo Inc is a front line multinational American based company that specializes in multiple services and products.... These services are broadly associated with the online and electronic devices applications and usage.... .... ... ... Yahoo Inc: Yahoo Inc is a front line multinational American based company that specializes in multiple services and products....
10 Pages (2500 words) Essay

Information Security as Career Choice

The job profile also includes providing administrative and technical support to various departments within the organization in the area of Information Technology and Security and implementing security standard and procedures.... While easy access to information through internet has revolutionized dissemination of information, the security of the same has become a cause of great concern.... The My career choice is in the area of information security and I hope to work as Information security Manager in some reputed firm....
1 Pages (250 words) Essay

Masters of science in I.T. progam

My experience with these colleagues woke me up to the fact that the world faces a lot of challenges in relation to Information Technology and Security.... After doing a lot of background research and soul searching, I have made a decision to pursue a Master of Science in information technology (MSIT) at the Endicott College.... Soon after graduating with a degree in criminal justice, I worked closely with individuals who were experts in the field of information technology....
2 Pages (500 words) Personal Statement

The Contemporary Legal Landscape in the IT Industry

echnical aspects of security entail the security management.... They should know the Sale of Goods Act, Supply of Goods and Services Act.... hese laws guides on transfer of assets, staff and commercialization of IT products.... practise this profession with violating the law(Aura, 2012) ...
6 Pages (1500 words) Essay

Health Care IT Systems

According to the text, the main function of the CIO to solve the problems related to information technology for the top level management in the healthcare organization.... CTO (Chief Technology Officer) is an information technology designer to build IT infrastructure in the healthcare organization.... information technology will create a better quality of work and reduce the wastages of money....
5 Pages (1250 words) Essay

The Internship with Flame Computers Company

To enhance my knowledge and skills, I got an opportunity to join Flame Computer Information Technology and Security System Company for the internship.... Flame Computer Information Technology and Security System is a technology-intensive corporation established in 1994 to provide small and medium-sized businesses with information technology solutions.... he main objective of Flame Computers is to become a top-class IT and security solution trading company on both domestic and overseas fronts....
20 Pages (5000 words) Report
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us