logo image

Information Technology Essay

The Correlation Between Information Technology Infrastructure and Corporate Success There is no more debate necessary when it comes to acknowledging that this present world is in the Information Age. But technology is improving so fast making it difficult to conclude with utmost certainty whether a company’s Information Technology infrastructure is a source of competitive advantage or simply another complicated corporate strategy. The following literature review will attempt to find out more definitive answers.

Importance of IT In Jagdish Pathak’s book the author claimed that there is no longer any doubt with regards to the essential role that information plays in today’s society (2005, p. 107). The said author made a further claim that in the near future this trend will continue. It is an imperative to invest in the firm’s IT requirements. The need for innovation and constant upgrades in the security system is almost second nature to those desiring to lead the pack in the highly competitive global business environment.

But the establishment of a system that ensures security, integrity of data and accessibility of the same, is only the beginning for those who want to remain competitive and determined not to be rendered irrelevant in the world of e-business (see

Need essay sample on "Information Technology"? We will write a custom essay sample specifically for you for only $ 13.90/page

Khosrowpour, 2006). There is a need for a more sophisticated IT infrastructure that can help managers make the right decisions. Robert Thierauf explains it this way, “Today’s worldwide marketplace provides not only more customers, suppliers, and competitors but also increased complexity for the decision-making process.

The speed of communication simultaneously makes the environment less stable and predictable and reduces the available time for examining business information, knowledge, and intelligence” (2001, p. 65). Shifting needs, rapid changes in technology and the increasing sophistication of the hackers are the major reasons why developers and creators of a company’s IT infrastructre are having their plates full. In the 21st century these things are becoming routine (see Pastor-Satorras & Vespignani, 2004). William Rapp asserts that IT is doing wonders in the corporate world.

He said that this is accomplished by enhancing worker’s skills and improving overall management structure that allow for clearer accountability and a means to arrived at informed decisions at a faster pace as compared to traditional filing systems (2002, p. 17). Limitations Moreover, “Information security demands are growing due to the higher interconnection of networks and systems between individuals and organizations” (Dowland, 2005, p. 262). It is becoming more and more difficult to secure an organization’s IT infrastructure, if the area that needs to be covered is as big as the planet.

And this is no exaggeration because when the transition phase is over, the whole world will be interconnected, every nation, every continent will be joined together in a massive networking of telecoms and internet. This complicates the problem of security much further because the solution does not only call for a more intelligent deterrent and security protocol. The architect for a new security protocol must design their system having the end user in mind; that they may be able to access reliable information, useful for doing their work (Kindervag, 2006, p. 7-16).

In other words a well-guarded database does not mean anything for the enterprise if information could not be readily accessed by authorized personnel. The number one challenge for modern management information systems is the creation of a seamless IT architecture that can ensure an error free e-business. This is extremely difficult to do for an organization that relies on internet and telecommunication networks in order to conduct businesses in multiple locations all over the world (Cox, 2007, p.10-20).

Now after upgrading the system to satisfy customer needs, an organization begins to work on another aspect of the system which is to secure it from threats. But before designing a new security protocol MIS will have to work in tandem with end-users which in most e-businesses comprise of their customers as well as their own employees. After the successful creation of a new IT architecture the next challenge is the installation and implementation of the new system (McCumber, 2005, p. 173).

Can’t wait to take that assignment burden offyour shoulders?

Let us know what it is and we will show you how it can be done!
Sorry, but copying text is forbidden on this website. If you need this or any other sample, please register

Already on Businessays? Login here

No, thanks. I prefer suffering on my own
Sorry, but copying text is forbidden on this website. If you need this or any other sample register now and get a free access to all papers, carefully proofread and edited by our experts.
Sign in / Sign up
No, thanks. I prefer suffering on my own
Not quite the topic you need?
We would be happy to write it
Join and witness the magic
Service Open At All Times
Complete Buyer Protection
Plagiarism-Free Writing

Emily from Businessays

Hi there, would you like to get such a paper? How about receiving a customized one? Check it out https://goo.gl/chNgQy

We use cookies to give you the best experience possible. By continuing we’ll assume you’re on board with our cookie policy