Customer center

We are a boutique essay service, not a mass production custom writing factory. Let us create a perfect paper for you today!

Example research essay topic: Affects Of Information Technology On Managerial Part 2 - 1,672 words

NOTE: Free essay sample provided on this page should be used for references or sample purposes only. The sample essay is available to anyone, so any direct quoting without mentioning the source will be considered plagiarism by schools, colleges and universities that use plagiarism detection software. To get a completely brand-new, plagiarism-free essay, please use our essay writing service.
One click instant price quote

... secure environment. According to a 1998 study done by the Computer Security Institute, security staffs at small organisations are growing at a rate of 68 percent per year. Medium and large organisations were also hiring, 27 percent for medium companies and 24 percent for larger ones.

These statistics show that companies of all sizes are interested in security, from which you can conclude security is not a luxury it is a necessity (Joss. M, 2000). After the events of September 11, the amount of spending on IT security has increased (Kirkpatrick, 2002). IT executives are more thoroughly enforcing security procedures, and line executives are more willing to improve security practices.

Overall, security, already a top priority has gained more importance. The risks associated with not fully securing the organisation from outside threats are substantial with the following problems likely to occur. Seemingly innocuous information can expose a computer system to compromise. Information that intruders find useful includes which hardware and software are being used, system configuration, type of network connections, phone numbers, and access and authentication procedures. Restricted information can enable unauthorized individuals to get access to important file and programs, thus posing a dangerous threat to the system. Those at risk include banks and financial companies, insurance companies, brokerage houses, consultants, government contractors, government agencies, hospitals and medical laboratories, network service providers, utility companies, the textile business, universities, and wholesale and retail trades.

The following information gives you an idea of how easy the Internet can be exploited and as a result more security jobs will become available. Many early network protocols that now form part of the Internet infrastructure were designed without security considerations. Without a fundamentally secure infrastructure, network defense becomes a difficult task. To add to these problems, the Internet is increasingly becoming dynamic, in terms of both topology and emerging technology. Because of the structure of the Internet and the original design of protocols, Internet attacks in general are quick, easy and inexpensive, and difficult to trace. Another factor contributing to the vulnerability of the Internet is the rapid growth and use of the network, along with the rapid deployment of network services involving complex applications.

In most cases, these services are not designed, configured and maintained securely. In order to get the product out to the market quickly, they do not fully ensure that all the bugs are tested and as a result introduce new vulnerabilities. Compounding the problem, operating system security is not considered in the purchase criteria. Commercial operating systems vendors often report that sales are driven by customer demand for performance, price and ease of use, maintenance and support.

As a consequence, these packages often come with an insecure configuration that allows sites to use the system immediately after installation. This lack of secure configuration makes the system vulnerable to attacks, which sometimes occur within minutes after connection. The rapid explosion of the Internet has expanded the need for well-trained and experienced people to engineer and manage the network in a secure manner. With the need of network security experts far exceeding the supply, there are many job opportunities available in the area. In recent years, numerous reports have been commissioned by accounting bodies, for the sole purpose of examining the drivers of change that will impact on the role of accountants in the future. From these studies, a common consensus on the drivers of change include: the global economy, information technology, the empowered consumer, the demand for greater accountability, environmental and sustainability issues, new work patterns, new sources of competition, demands for small business, concentration of capital markets, and intellectual capital issues.

The field of internal auditing has undergone revolutionary change. In the 1990 s, a number of organisations worked to restructure the internal audit function, while doing so improve cost, performance and value. The main focus of internal audit is no longer restricted to hazard avoidance and compliance with legislation. Companies expect and demand that their internal auditors are capable of demonstrating skills in a variety of disciplines and that these skills are more representative of a consultant than that of an auditor. The forces driving change within the profession are as follows: e-business is changing internal audit in the same manner that it is affecting all aspects of business businesses continue to transform through mergers, acquisitions, and re-engineering of business processes the pace of change continues to accelerate The Internet is the engine driving the information age and the future of e-commerce. Society and business has experienced a paradigm shift to the use and acceptance of electronic communications.

This has been the catalyst for the increased demand within the business sector for people who have an understanding of and experience in managing communication networks. E-commerce addresses the needs of organisations, merchants, and consumers to reduce costs while improving the quality of goods and services and supply-chain management. Companies can no longer ignore the impact of e-business if they hope to remain competitive and successful. There are many organisations unwilling to embrace e-commerce, due to the many issues that come with it.

Firms that currently participate in Internet commerce show distrust in many e-business processes. The primary concern being the confidentiality and authenticity of transactions conducted on-line. Business-to-business e-commerce is expected to exceed $ 6. 3 trillion (in 2004), up from $ 43 billion in 1998 (web). Regardless of these predictions, the full potential of e-business will only be evident if business partners trust e-commerce transactions. As an essential part of an organizations risk management approach, Internal auditing, can play a large role in building trust.

Internal auditing specializes in those areas that create trust between partners. Left unsupervised, a number of e-business risks can surface which seriously threaten the trust. These risks centre on areas such as authentication, and encryption, shared applications and compliance with global privacy laws. Failure to identify these risks can cause serious detriment to the success of the e-business strategy being implemented. The internal audit can deliver value by addressing several key issues including: how careful is your firm with key internal and third-party information?

is your technology reliable? are your processes and procedures aligned with your technology? are your policies and procedures adequately articulated? who are your key e-business partners?

are you living up to your privacy statements? The information society concept has emerged and evolved mainly during the last three decades from an originally abstract object for discussion. It evolved into a widely accepted concept as a result of simultaneous advances in microelectronics, computing and communications. A successful information society evolution is currently seen as the foundation for future prosperity in modern communications.

The role of wireless communication will adopt as information anywhere or anytime. The wireless communications industry its self in its life span has increased its growth enormously. Communication is the process of sending information to a receiver. Communication starts when a sender wants to influence the receiver or the receiver needs information from the sender. The important factor relating to communication is the constantly expanding and increasingly sophisticated selection of technologies, which can be used to mediate the communication process.

The new technologies are facilitating new relationships and as a result society is ever changing. The mobile phone when introduced in the mid nineteen nineties has continued to develop offering more methods of communication compared to its traditional audible voice only method and is now a very small and compact device that offers a vast spectrum of communicating information methods at a very affordable price for users. Its the price and effectiveness of portable devices such as the mobile phone that has created its popularity with the information world. Applying scenario planning on real life situations can be a time consuming and bothersome process. Trying to come up with scenarios and actually try to express them is difficult considering that the future is very unpredictable. Coming up with the main driving forces behind the changes in the scenarios was the most difficult part.

For instance trying to isolate specific reasons as to why internal auditing has changed so much since the discipline was formally recognised would involve asking the heads of auditing firms why this has happened. This is because we are not familiar with the discipline and coming up with our own judgements from references would not cover all angles. Coming up with all the driving forces would be an expensive and exhausting process. That is why we can only mention what is commonplace and easily accessible.

Information regarding current trends is also difficult to access via the web, as some documents require you to pay for it. When approach with the problem of having to develop scenarios for efficient managerial opportunities within the IT/IS industry, it was hard at first to separate how the discipline itself would change compared with that of the skills required to complete the jobs. Very broad strategic questions are harder to evaluate through scenario planning. The original question given was broad and it was hard to try to narrow the scope once we came up with the scenarios. Scenarios cannot remove uncertainties. Instead, scenarios help to come to a reasonable judgement about what specific strategy will be successful in only one future scenario or robust across a range of possible futures.

Bibliography: Ardor, Ann, . Window on the future: A Scenario Planning Primer (With a peek into the future of handheld computing). Available at: web Cooper, Barry. (2002), The future accountant, Available at web Dekker, Marcel. (1997), The Security of the Internet, Available at web Gurdarshan S Gill, Graham Cosserat, Philomena Leung, Paul Can, Modern Auditing & Assurance Services, 6 eth Edition John Wiley & Sons Brisbane 2001. Joss. Molly. , (2000), Careers IT Security Jobs provide plenty of security Available at: web Kirkpatrick, Terry.

A. (2002), Security, Available at: web Konsbruck, Robert Lee. Impacts of Information Technology on Society in the New Century. Available at web La Torre. Jim. , E-business: A matter of Trust. Available at web Lawrence, Newton, Corbitt, Braithwaite, Parker (2002) Technology of Internet Business, Jacaranda Wiley, Brisbane.

web


Free research essays on topics related to: mobile phone, internal audit, e commerce, driving forces, e business

Research essay sample on Affects Of Information Technology On Managerial Part 2

Writing service prices per page

  • $18.85 - in 14 days
  • $19.95 - in 3 days
  • $23.95 - within 48 hours
  • $26.95 - within 24 hours
  • $29.95 - within 12 hours
  • $34.95 - within 6 hours
  • $39.95 - within 3 hours
  • Calculate total price

Our guarantee

  • 100% money back guarantee
  • plagiarism-free authentic works
  • completely confidential service
  • timely revisions until completely satisfied
  • 24/7 customer support
  • payments protected by PayPal

Secure payment

With EssayChief you get

  • Strict plagiarism detection regulations
  • 300+ words per page
  • Times New Roman font 12 pts, double-spaced
  • FREE abstract, outline, bibliography
  • Money back guarantee for missed deadline
  • Round-the-clock customer support
  • Complete anonymity of all our clients
  • Custom essays
  • Writing service

EssayChief can handle your

  • essays, term papers
  • book and movie reports
  • Power Point presentations
  • annotated bibliographies
  • theses, dissertations
  • exam preparations
  • editing and proofreading of your texts
  • academic ghostwriting of any kind

Free essay samples

Browse essays by topic:

Stay with EssayChief! We offer 10% discount to all our return customers. Once you place your order you will receive an email with the password. You can use this password for unlimited period and you can share it with your friends!

Academic ghostwriting

About us

© 2002-2024 EssayChief.com