StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Discuss the information technology control - Essay Example

Comments (0) Cite this document
Summary
The discussion aims at highlighting the importance and relevance of information technology controls in the business environment and more importantly in the organizational environment. Information technology and controls can be defined as specific tasks and activities performed…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER97.8% of users find it useful
Discuss the information technology control
Read TextPreview

Extract of sample "Discuss the information technology control"

Information Technology Controls By [Presented to] of Discussion The discussion aims at highlighting the importance and relevance of information technology controls in the business environment and more importantly in the organizational environment. Information technology and controls can be defined as specific tasks and activities performed by individuals or systems based on the effective utilization of technology to achieve proposed aim and objectives of the organization (Gallegos, et al, 2005). This statement shows that information technology and controls has great importance in the organizational set up and should be considered as an important element of the organizational framework to achieve desired objectives and results in the competitive business environment.
Information technology and control can be considered as an internal control initiative of organizations related to the maintenance of confidentiality and integrity of available data along with the effective management of the information technology functions within the organization. This means that management of confidential information along with controlling the flow of information is the major task of information management control. However, information technology control has different facets with different importance and value in the operational framework that also needs to be assessed and analyzed for a better understanding over the subject matter.
Information technology control can be classified under two heads; Information technology general controls and information technology application controls with both having different value and benefits. Information technology general controls are based on controlling the information technology environment, computer operations, program development, program management and access of programs as per the need and demand. It can be considered as a basic framework of managing information technology functions within the organization.
On the other hand information technology application controls refer to transaction controls mainly related to the input of data based on transactions. It also checks whether all transactions in the form of data have been stored and processed in an effective manner or not along with ensuring that only approved business users can access data and information in a logical and ethical manner. Basically, the whole act is to ensure that data has been stored in the right manner along with making them accessible to a number of users who are an important part of the organization.
It needs to be mentioned that every organization has certain confidential data and information pertaining to the financials that need to be stored in a safe environment and information technology controls offer that safe and secure environment. The management of information and data is done using the technology in an effective and efficient manner leaving very little scope for mismanagement of data and information that can cause serious business complexities in the competitive business environment. Organizations can use information technology controls to ensure safety and security of business transactions and data along with adding value through switching to a systematic approach of data management. This often results in achieving the goals and objectives of the business as information is available as and when required enhancing the overall appeal of the operational framework of the organization.
Conclusion
The above discussion on information technology controls clearly states that the management and control of business data and information is an important activity that can be enhanced using effective technology. With general controls and application controls, organizations can ensure high level of safety and security of data and information that can be used to enhance the operational framework of the business.
Reference
Frederick Gallegos, Sandra Senft, D.P. Manson and C. Gonzales, (2005), Information Technology Control and Audit, Retrieved on December, 09, 2011 from http://www.isaca.org/Journal/Past-Issues/2005/Volume-4/Documents/jpdf0504-Information-Technology.pdf Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Discuss the information technology control Essay - 1”, n.d.)
Discuss the information technology control Essay - 1. Retrieved from https://studentshare.org/miscellaneous/1586515-discuss-the-information-technology-control
(Discuss the Information Technology Control Essay - 1)
Discuss the Information Technology Control Essay - 1. https://studentshare.org/miscellaneous/1586515-discuss-the-information-technology-control.
“Discuss the Information Technology Control Essay - 1”, n.d. https://studentshare.org/miscellaneous/1586515-discuss-the-information-technology-control.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Discuss the information technology control

Information Technology

...of the actual situation and take important business decisions. The hierarchy based information flow does not allow confidential information to pass down the ladder but at the same time gives transparency to key business segments. The essay will be discussing these key areas that Information Technology has opened and then critically analyze the finer points which make IT and the IT based organization to be more organized, structured and motivated for the common good of the business, work culture and the industry in particular. Keeping in mind these key areas, the essay will be taking into account two important principles based on which an IT based...
9 Pages(2250 words)Essay

Information technology

...is “getting things done through other people” (The Big Geek, 2010). It would be a great opportunity for me to work as Lead Information Technology Manager in Magnum Enterprises. Keeping in view the diverse roles of the lead IT manager and the purpose of Magnum Enterprises for hiring me, I would like to discuss on integrating the software, hardware and business management capabilities. I believe that the role of IT Management includes: the research and development by understanding the IT requirements of the company and implementing software and deploying hardware so that the company should be able to enhance productivity. In order to achieve my objective, I need to work on developing the...
20 Pages(5000 words)Term Paper

Ethics of Information Communication Technology

...Ethics of Information Communication Technology The topic of our research is New Technologies and the emergence of cyber crime and digital fraud- cost on the United Kingdom economy. The objective of the study is to analyze the need of ICT and its resulted effects. As we know, that ICT has helped the world to turn into a global village. The concept of globalization has benefited the world in a number of ways. Digital convergence and globalization in the rising knowledge society has increased the complex legal, ethical, and societal issues. Now the society is facing difficult and complex questions related to the access of information, right to privacy, cultural diversity...
4 Pages(1000 words)Dissertation

Information Technology Acts Paper

.... In this paper I will discuss two popular information technology acts. Basically, this research will cover Telephone Consumer Protection Act (TCPA) of 1991 and Cable Communications Act of 1984. The main objective of this research is to assess potential impact of information technology on ethical issues necessitating the creation of these acts. Cable Communications Act of 1984 First act that I am going to discuss in this paper is the Cable Communications Act of 1984. This act was established in 1984. This act was developed and implemented as a new law that offered a great deal of support for balancing the resistance between the local...
3 Pages(750 words)Essay

Information Technology

...to comply with eco-friendly policies included in corporate social responsibilities (Kynetix Technology Group, 2009). It is benefitted by creating special unit like ITAP which monitors balance scorecard to check the performance of each department in terms of cost, effectiveness and efficiency (Tesco.com, 2008). If demand occurs, new project can be started to enhance the performance of unit. References Aberdeen Group, (2009). Business Adoption of Cloud Computing. Retrieved July 12, 2010 from http://www.aberdeen.com/summary/report/benchmark/6220-RA-cloud-computing-sustainability.asp De Haes, S. and Van Grembergen, W. (2004). IT Governance and its Mechanisms. Information Systems Control...
9 Pages(2250 words)Essay

Information Systems and Technology

...This Assignment relates to the case study: JP Morgan Chase Shifts IT Outsourcing into Reverse Information Systems and Technology Student NO. S0507351/ 2 Name of University Abstract This case study gives an overview of JP Morgan Chase's move back from outsourcing. In this paper, we will discuss their information technology and information systems strategy in relation to their business requirements. We will also discuss the methods which might be used for developing new systems following the merger with Bank One based on our own knowledge of systems theory and systems development practice. The effectiveness of the...
8 Pages(2000 words)Case Study

Information control

..., a security measures is established. There are numerous threats to the security of Internet e-commerce. Security breaches are most frequently discussed in terms of the Internet and the danger that hackers will intercept messages, misuse the information or modify the content of the message. The internet is only one potential source of insecurity and several factors must be considered to assure user the security they want (e.g. authentication, confidentiality, integrity, and non-repudiation). Encryption allows the conversion of data into a code so that it cannot be read by unauthorized users. The data is converted into the code by the customer and decoded by the decryption application at the server. Modern...
12 Pages(3000 words)Essay

Information Technology

...February 9, Information Technology Introduction The new information technology attention focuses on enhanced data transfer. The paper delves on different information technology updates. Information is grounded on how information is saved, transmitted and retrieved. The paper focuses on the strengths and weaknesses of the latest technology. Lastly, the paper discusses the advantages of one chosen information technology. Some of the latest information technologies enhance information...
4 Pages(1000 words)Research Paper

Sweden in Review

6 Pages(1500 words)Essay

Control Objective for Information and Related Technology

...Finance and accounting Executive Summary The main purpose of the report is to highlight the usage of Control Objective for Information and Related Technology (COBIT) framework by organisations. It also enumerates the criteria that are developed by the framework in order to align the use of information technology (IT) with the goals of the organisations. In light of this, the usage of IT by several organisations is depicted along with the collapse of HIH Group. The reasons for the collapse are related with the inefficient information system that has been used by the company, GEN+. It not...
9 Pages(2250 words)Book Report/Review
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Essay on topic Discuss the information technology control for FREE!

Contact Us