The Scope of Information Systems

The following sample Information Technology essay is 1036 words long, in APA format, and written at the undergraduate level. It has been downloaded 626 times and is available for you to use, free of charge.

Information systems in today’s society encompass the development, utilization, management, and control of hardware, firmware, and software processes. These processes work in unison to enable organizations to collect, store, and disseminate information efficiently. The effective use of information systems leads to the ultimate success of the organization. The utilization of the information maintained and controlled by an organization is employed to:

Develop a comprehensive understanding of how the information system supports organization operations while continuously monitoring data collected and stored within databases (Gallagher & Locke 14).

Pinpoint potential challenges that may arise following the implementation of a risk management framework (Gallagher & Locke 3).

Identify weaknesses with the information system.

Determine ways to mitigate and fix any inadequacies (Gallagher & Locke 3).

Utilize data obtained from assessments to make informed decisions about budgets and future investments.

In an effort to conduct routine business functions, CIOs and IS managers encounter challenges regarding the protection of information systems. Organizations find it paramount to focus on:

Selecting security controls to avoid issues with an organization’s operations and assets (Quigley & Yasin 25). Security controls ensure the privacy and integrity of the information within the system. Once security controls are utilized correctly the controls serve as a way to measure its effectiveness (Gallagher & Locke 1).

Based on this data the organization can assess and evaluate the potential risk to the operations, assets, and individuals within the organization in addition to the risk to other organizations and the Nation from the utilization of information systems (Gallagher & Locke 1).

The emergence of innovative advancements in information systems has evolved into current trends. Although some trends are expected to remain popular, others will decrease in popularity over time. Widespread trends include:

Next-generation devices such as smartphones and tablets.

Social networks and social media websites have emerged as a new way to communicate. In fact, the growth in revenue generated from social media-based businesses is higher than their less social organizational counterparts (Harris & Rae 24). Social media will serve as a primary means of delivering product development and customer service in the future.

Cloud computing is being adopted gradually for non-mission applications (Dzubeck 1). Although cloud computing leads to cost reduction and increased accessibility to next-generation designs, if cloud computing shortcomings are not resolved and adopted by major companies its downfalls may be the brink to the demise of cloud computing (Dzubeck 1). Datasets will need to be transferred back and forth between the cloud in a quick and efficient manner otherwise the safety of cloud computing will decrease its popularity.

Information systems careers that will remain in high demand in the near future include:

Mobile application development: As smartphones and tablets change the way we communicate for personal; business or entertainment purposes more mobile application development careers will be available (Saliba 62).

Database administrator: Since businesses record, store, and analyze collections of digital information, the need to secure these databases opens up more opportunities for database administrators (Saliba 62).

Network administrator: Technological advancements affect an organization’s investment in new network systems to increase productivity. Since millions of people have access to the internet, companies are now benefiting more from online business. As a result, more careers in network administration will be needed to manage the use of network technology and communication with customers (Saliba 62).

IT security analyst: The security of an organization is an ongoing threat to hackers and cyber-attacks. Organizations seeking to combat this issue are looking for professionals with skills in IT operations security, information assurance, and mobile device security (Saliba 62).

Technological innovations including state-of-the-art storage media, enhanced hardware processes, and advanced software have revolutionized the collection, storage, and utilization of data. Organizations now rely on data warehousing to retrieve public information and integrate it into large databases. External data sources including highly secure personal information about stock trades, subscription information, and medical history are also gathered (Watson 8). Advancements in technology have raised ethical questions surrounding the regulation of data warehousing and concerns regarding privacy, ownership of data, privacy, and accessibility.

Although the retrieval and manipulation of data are used to identify current trends and predict future trends based upon consumer purchasing practices, this information is extracted at a tangible and intangible cost to consumers (Watson 8). Data warehousing exposes personal information that consumers may not want to disclose. The privacy of an individual is at stake when the security of data and information is breached. Major concerns over the violation of privacy rights result in future implications. The consumer has no control over their private information and will suffer immensely over the improper use of this data. Therefore, organizations that collect and analyze sensitive information must take full responsibility and prevent the unauthorized unethical use of this information by employees and other users (Watson 8). When this data is used by the wrong person this information can be detrimental to the privacy, security, and integrity of the consumer. This problem is further complicated by the increased accessibility of data from mobile devices that connect to data warehouses leaving personal information prone to attacks by hackers (Watson 8). The challenge of maintaining a balance between the security of databases that store information for analysis purposes and the privacy of consumers in data warehousing presents ethical implications for consumers.

Works Cited

Dzubeck, Frank. "Cloud Computing: End of the Corporate WAN?" Network World Canada 24.20 (2008): 1. ProQuest. Web. 7 Dec. 2013.

Gallagher, P.D., & Locke, G. “Information Security.” National Institute of Standards and Technology. (June 2010): 1-14.

Harris, Lisa, & Rae, Alan. "Social Networks: The Future of Marketing for Small Business." The Journal of business strategy 30.5 (2009): 24-31. ProQuest. Web. 7 Dec. 2013.

Quigley, J. V., & Yasin M. M. "The Utility of Information Systems: Views of CEOs and Information System Executives." Industrial Management + Data Systems 94.5 (1994): 25. ProQuest. Web. 6 Dec. 2013.

Saliba, George N. "Careers of the Future." New Jersey Business (2009): 62. ProQuest. Web. 6 Dec. 2013.

Watson, Thomas. "The Power and Danger of Warehousing." Computer Dealer News Mar 30, 1998: 8. ProQuest. Web. 7 Dec. 2013.