Information Technology

This essay has been submitted by a student. This is not an example of the work written by professional essay writers.

Subject:
Published:
1 April 2016

Remember! This is just a sample.

You can get your custom paper by one of our expert writers.

Get custom essay

75 writers online

Write a 200- to 300-word short-answer response to the following: How is information used in the modern enterprise? How does this use affect IT systems?

Information technology has become spreading widely throughout our society. We live in a modern world with Internet access from our home, fast food chains, offices, schools and on our mobile devices, such as iPhones, iPods, Blackberries and Android Phones. Nowadays, the use of internet became essential to communicate distantly and the use of social medias for interactions as well as businesses through online marketing or other called as the e-commerce. The rapid advancement of this system has elevated the importance of the IT function. Information technology in the modern enterprise has developed gradually from a back-office component to a most important operational constituent that could improve businesses performances and increases shareholders value. Enterprises such as marketing, sales and finance are now cooperated by information technology.

The core success of an organization is information technology because it serves daily operational support and enables enterprise wide change. Since information technology is essential in a modern enterprise it is sometimes serve as a threat in today’s organization. One of the examples is the personal information which can be sending through the use of systems and it can be a threat if this information consolidated from banks and accounts pertaining to financial aspects. In these cases, applying triad could be helpful that is Confidentiality, Integrity and Availability. The protection of the information from disclosure to unauthorized users is confidentiality while integrity refers to protecting information from being modified by unauthorized users. Ensuring that authorized users are able to access the information when needed is availability.

Cite this page

Information Technology. (1 April 2016). Retrieved from https://studyscroll.com/information-technology-2-essay

"Information Technology" StudyScroll, 1 April 2016, https://studyscroll.com/information-technology-2-essay

StudyScroll. (2016). Information Technology [Online]. Available at: https://studyscroll.com/information-technology-2-essay [Accessed: 28 March, 2023]

"Information Technology" StudyScroll, Apr 1, 2016. Accessed Mar 28, 2023. https://studyscroll.com/information-technology-2-essay

"Information Technology" StudyScroll, Apr 1, 2016. https://studyscroll.com/information-technology-2-essay

"Information Technology" StudyScroll, 1-Apr-2016. [Online]. Available: https://studyscroll.com/information-technology-2-essay. [Accessed: 28-Mar-2023]

StudyScroll. (2016). Information Technology. [Online]. Available at: https://studyscroll.com/information-technology-2-essay [Accessed: 28-Mar-2023]

Don't use plagiarized sources. Get your custom essay..

get custom paper

We use cookies to personalyze your web-site experience. By continuing we’ll assume you board with our cookie policy.