discuss the influence of technological advancements | Computer Science

discuss the influence of technological advancements | Computer Science

The article aims to discuss the influence of technological advancements through IT systems in institutions. First, the article discusses the benefits associated with the use of technological solutions in different institutions. However, after discussing the general points, the author heads straight to the theme where the paper highlights the potential risks associated with the increased use of technology. Therefore, the paper aims to discuss some of the risks associated with increased reliance and use of technological solutions and how they can negatively affect the business once exploited by malicious people.

Impressively, the research relies on several initially conducted studies on the risks associated with large-scale reliance on IT. As a result of this, the author is able to focus on the major points while offering additional insights on how the technological risks emerge. By maintaining focus on a specific aspect of IT, that is, security; the author provides additional information which is relevant to research on IT. As it stands, not many articles can be found on modern security threats when dealing with information technology security threats (Peltier, 2013). Thus, the research helps provide new information while expanding on initially conducted studies in an attempt to come up with relevant solutions to the problem of increased security threats.

Indeed, from analyzing the article and similar articles in the field of IT; it is safe to conclude that more research is required, more so in the topic of security for systems that rely heavily on IT solutions and technological advancements. As technology continues to improve so does the threats associated with technology (Andress, 2014). Therefore, this implies that it is necessary for scholars to conduct extensive studies on the need for improving security in systems that rely on advanced technology.

Information security is an essential aspect of IT which ensures there exists more positives than negatives when dealing with technological solutions. Therefore, information security is a field of interest for people interested in improving the efficiency of technology influenced solutions. When necessary security measures are put in place, it is easier for different stakeholders to use the systems without the persistent fear of hacking or system infiltration.

Article assessment

The article in examination provides relevant information regarding information security. However, for increased accuracy, the author should have conducted a more extensive literature review. This would have enhanced the credibility of the article and consequently make it more relevant in regards to information security topics. Except for a few linguistic errors, the paper was well written although it lacked a concise thesis that explained the aim of the paper to the reader. The author mainly relied on initially conducted research as a point of reference as no direct study was conducted. Therefore, due to the high level of research and strategic utility of peer-reviewed sources, the article is appropriate, more so when dealing with issues regarding security. The paper can be used to understand the vulnerability of information systems and how best institutions can position themselves to reduce the instances of hacking or inappropriate use of the systems. What is more, the paper can be used as an avenue for conducting further research on the topic of information security. This gives scholars something to build on when tackling the topic in the future.

Hiring Portfolio Outline

Resume

Future Goals

Personal goals

Training

Professional goals

Conclusion

Ethical Application

Ethical issues

Ethical violations

Ethical compromises

Conclusion

Information Security

Case Management of Security issues

Advanced studies in the IT security

Experience in IT security

Conclusion

References

References

Andress, J. (2014). The basics of information security: understanding the fundamentals of InfoSec in theory and practice. Syngress.

Peltier, T. R. (2013). Information security fundamentals. CRC Press.

Order from us and get better grades. We are the service you have been looking for.