Risks in the Use of Information Technology Within Organizations

نویسندگان

  • G DHILLON
  • J BACKHOUSE
چکیده

Information systems researchers and practitioners alike have always felt the need to minimize systemic risks arising out of the usa of information technology. Research has identified the confidentiality, integrity and aveilubility of information as vital concepts. However, in developing counter-measuras to threats in these three areas the focus has been on questions such as computer viruses, hacking, system failures and access control. Thus the primary coecern has been for the technical installations and their functionality, in co,~;~mut this research sees information technology usage in terms of the integrity and the wholeness of systems, social as well as technical. It argues that by maintaining the integrity of information systems, the risks associated with information technology usage can be minimized.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Meta-Analysis of Studies of the Effective Factors in the Application of Information Technology in the Organizations of Iran

Purpose: The application of Information Technology (IT) in organizations, is influenced by a myriad of factors within the context of individuals, organizations, and the environment. These factors either facilitate or hinder the correct use of information technology in the organizations. Since the main reason for any organization to use information technology of any kind is increasing the organi...

متن کامل

A New Extended Analytical Hierarchy Process Technique with Incomplete Interval-valued Information for Risk Assessment in IT Outsourcing

Information technology (IT) outsourcing has been recognized as a new methodology in many organizations. Yet making an appropriate decision with regard to selection and use of these methodologies may impose uncertainties and risks. Estimating the occurrence probability of risks and their impacts organizations goals may reduce their threats. In this study, an extended analytical hierarchical proc...

متن کامل

Presentation of the Extended Technology Acceptance Model in Sports Organizations

Background. In recent decades, information technology has become a vital component of various aspects of our lives. The use of information technology in different domains has made the analysis of the level of its acceptance/rejection a significant factor in organizations. Objectives. The aim of this study was to illustrate the application of the extended technology acceptance model in sports o...

متن کامل

Cloud Computing Technology Algorithms Capabilities in Managing and Processing Big Data in Business Organizations: MapReduce, Hadoop, Parallel Programming

The objective of this study is to verify the importance of the capabilities of cloud computing services in managing and analyzing big data in business organizations because the rapid development in the use of information technology in general and network technology in particular, has led to the trend of many organizations to make their applications available for use via electronic platforms hos...

متن کامل

The impact of information technology on health

Information Technology (IT) is the study of systems especially computers for storing, retrieving, and sending information. It uses any networking and other physical devices, infrastructures to secure and exchange all forms of electronic data. IT is used globally as a major portion of daily life and we use it nearly every day within organizations for many reasons. Our computers, mobile phones an...

متن کامل

The role of Real option in e-business Risk management: The case of E-treasury project

Implementing information technology projects requires a calculated process to prevent failure. At the same time application of information technology in organizations faces various potential risks. Exploring information technology environment in organizations reveals the potential risks and provides a structure for comprehensive risk management. There are various methods available for risk mana...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2003