StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Discuss the information technology control - Essay Example

Cite this document
Summary
The discussion aims at highlighting the importance and relevance of information technology controls in the business environment and more importantly in the organizational environment. Information technology and controls can be defined as specific tasks and activities performed…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96.6% of users find it useful
Discuss the information technology control
Read Text Preview

Extract of sample "Discuss the information technology control"

Information Technology Controls By [Presented to] of Discussion The discussion aims at highlighting the importance and relevance of information technology controls in the business environment and more importantly in the organizational environment. Information technology and controls can be defined as specific tasks and activities performed by individuals or systems based on the effective utilization of technology to achieve proposed aim and objectives of the organization (Gallegos, et al, 2005).

This statement shows that information technology and controls has great importance in the organizational set up and should be considered as an important element of the organizational framework to achieve desired objectives and results in the competitive business environment.Information technology and control can be considered as an internal control initiative of organizations related to the maintenance of confidentiality and integrity of available data along with the effective management of the information technology functions within the organization.

This means that management of confidential information along with controlling the flow of information is the major task of information management control. However, information technology control has different facets with different importance and value in the operational framework that also needs to be assessed and analyzed for a better understanding over the subject matter. Information technology control can be classified under two heads; Information technology general controls and information technology application controls with both having different value and benefits.

Information technology general controls are based on controlling the information technology environment, computer operations, program development, program management and access of programs as per the need and demand. It can be considered as a basic framework of managing information technology functions within the organization.On the other hand information technology application controls refer to transaction controls mainly related to the input of data based on transactions. It also checks whether all transactions in the form of data have been stored and processed in an effective manner or not along with ensuring that only approved business users can access data and information in a logical and ethical manner.

Basically, the whole act is to ensure that data has been stored in the right manner along with making them accessible to a number of users who are an important part of the organization. It needs to be mentioned that every organization has certain confidential data and information pertaining to the financials that need to be stored in a safe environment and information technology controls offer that safe and secure environment. The management of information and data is done using the technology in an effective and efficient manner leaving very little scope for mismanagement of data and information that can cause serious business complexities in the competitive business environment.

Organizations can use information technology controls to ensure safety and security of business transactions and data along with adding value through switching to a systematic approach of data management. This often results in achieving the goals and objectives of the business as information is available as and when required enhancing the overall appeal of the operational framework of the organization.ConclusionThe above discussion on information technology controls clearly states that the management and control of business data and information is an important activity that can be enhanced using effective technology.

With general controls and application controls, organizations can ensure high level of safety and security of data and information that can be used to enhance the operational framework of the business.ReferenceFrederick Gallegos, Sandra Senft, D.P. Manson and C. Gonzales, (2005), Information Technology Control and Audit, Retrieved on December, 09, 2011 from http://www.isaca.org/Journal/Past-Issues/2005/Volume-4/Documents/jpdf0504-Information-Technology.pdf

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Discuss the information technology control Essay - 1”, n.d.)
Discuss the information technology control Essay - 1. Retrieved from https://studentshare.org/miscellaneous/1586515-discuss-the-information-technology-control
(Discuss the Information Technology Control Essay - 1)
Discuss the Information Technology Control Essay - 1. https://studentshare.org/miscellaneous/1586515-discuss-the-information-technology-control.
“Discuss the Information Technology Control Essay - 1”, n.d. https://studentshare.org/miscellaneous/1586515-discuss-the-information-technology-control.
  • Cited: 0 times

CHECK THESE SAMPLES OF Discuss the information technology control

Cloud Security and Privacy Issues

In this study the researcher will attempt to outline a number aspects that can create serious issues regarding this technology acceptance because security issues is one of the main aspects that an organization determines seriously before implementing a new technology based arrangement.... In this scenario, the researcher will present a comprehensive assessment of some of the main security issues and aspects of cloud computing structure which are still hindering in the successful application of this technology based arrangement....
4 Pages (1000 words) Research Paper

Ethics of Information Communication Technology

These systems illegitimately attack or access the information that is used by the businesses, citizens, and government.... With such backdrop, this paper will discuss the types of cyber crimes and the upcoming frauds that are done by them.... The purpose of this paper is to discuss the effects of cyber crimes on the citizens, businesses, government, and the relevant interventions to deal with it.... In this light, the paper will discuss the types of cybercrime and also talk about the ways these cyber crimes are taking place....
4 Pages (1000 words) Dissertation

Assistive Technology Devices

"Assistive technology Devices" paper discusses the various advantages and disadvantages associated with the use of these devices, it highlights the benefits the disabled may derive from the use of these devices and also discuss some of the possible problems.... hellip; The disabled will depend on other people for assistance and in most cases, there is an individual employed in order to help the disabled to perform their tasks, as a result of the introduction of assistive technology there has been an increase in job losses because their employers are now able to perform the task on their own using the devices....
6 Pages (1500 words) Coursework

Wal-Mart for a Strategic Management and Business Policy

They should create a financial control that comprises the comparison of what they have really accomplished with what they have premeditated in their budget and as such it is individual business task amongst a lot of and encompasses but one facet of the wider practice of management control (Thompson et al, 1995)....
4 Pages (1000 words) Research Paper

Department-Wide Information Systems Analysis

In a few cases, the information system fails to achieve their established goals.... Through this assessment, we will be able to access the reason behind the failure of the information system in the dysfunctional departments.... hellip; In the present technology-based age, Information systems are the basic need for each type of business and organizational management.... The paper "Department-Wide information Systems Analysis" discusses the main causes of failings of department-wide information systems when deployed in dysfunctional departments....
5 Pages (1250 words) Term Paper

Controls for Information Technology and Reporting and Evaluation

My company uses AICPA/CICA Trust Services framework in their IT-based work, as an information systems auditor, to evaluate internal controls over information technology.... It has recently implemented a computerized database system that stores all information about its employees, security guards, inventory,… It also helps one branch to electronically interact with branches in other cities. Generally, the internal control reporting options include generic tools, document management and work flow tools, real-time compliance tools, and data-mining tools....
2 Pages (500 words) Essay

Role of the Information Systems

Without a doubt, this era is considered as the era of information technology (IT), where only those business organizations get the success that make use of information technology more effectively than their competitors.... The basic objectives that business organizations want to achieve through the development and implementation of these modern technology based information systems include the overall corporate performance and effective and efficient handling of business data (Turban et al....
8 Pages (2000 words) Assignment

Access Control Methods in Information Security

Hacking is one of the most prevalent problems facing the information technology sector.... These counter-systems to these threats will be discussed in this study regarding their operation and the benefits they offer to the information technology field.... This paper ''Access Control Methods in information technology'' tells that access control is one of the most sensitive aspects of computer and computer systems' security.... As is evident with the masculinity of information technology as the contemporary means of capturing and storing information, access control systems must exist to protect information and information technology systems....
6 Pages (1500 words) Coursework
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us