ICT Revolution: Benefits and Risks for Organizations - Essay Sample

Paper Type:  Essay
Pages:  4
Wordcount:  916 Words
Date:  2023-02-27

Introduction

Organizations across various sectors of the economy have embraced the use of Information and Communication Technology (ICT). Constant technological innovations have influenced the widespread adoption of advanced tools such as computers and wireless means of communication. Some of the benefits associated with the use of information technology are increased convenience, more efficient methods of production, and enhanced connectivity. However, dependence on ICT necessitates organizations to consider security implications on information management. Companies have to implement cybersecurity measures to safeguard critical ICT resources. These include components such as computers, hardware, software, and computer networks (Nweke, 2017). Considering the widespread usage of information technology, strategies implemented by organizations to protect data and ICT infrastructure should uphold confidentiality, integrity, and availability (CIA) of information to ensure the safety of users' data.

Trust banner

Is your time best spent reading someone else’s essay? Get a 100% original essay FROM A CERTIFIED WRITER!

One of the sectors that have embraced the use of ICT to improve quality and service delivery is the health care industry. Hospitals have started using electronic health and medical records to gather, store, analyze, and share patient information. Given the sensitivity of patient records and the need to keep them private, health care facilities need to implement cybersecurity measures that promote the CIA. Tools such as QR codes can help collect and access the data with ease. Hospitals should only permit specific devices to decode the information (Dube, Ndlovu, Nyathi, &Sibanda, 2015). Mobile technology innovations have also made it possible for the public to connect with various medical professionals. For example, mobile medical apps have facilitated health care delivery that relies on ICT. To address CIA concerns about security and data use, hospitals can use threat model analysis to develop security controls (Treacy&McCaffery, 2016). Thus, health care organizations can enhance mobile app security while facilitating access to professional medical services.

Organizations in the banking sector need to implement cybersecurity measures that will uphold the CIA. Over time, banks have embraced the use of technology to reach more customers. The introduction of mobile and internet banking has allowed clients to utilize bank services with ease. However, e-banking has also exposed organizations to diverse threats. Some of the primary concerns associated with this model include user authentication, data confidentiality, availability of services (Akinyede&Esese, 2017). When banks consider developing and implementing security measures such as the use of biodata to grant access, they should prioritize self-efficacy (Al-Shawabkeh, MM, & NHM, 2015). The selected method should allow convenient access to users while restricting people with malicious intentions. Therefore, organizations can encourage the use of e-banking among customers by guaranteeing data safety, privacy, and easy access.

The use of technology in organizations has led to the accumulation of massive volumes of data. As individuals and businesses embrace ICT, big data is generated. The sources of the information include cloud computing, social media, and networking sites, and online transactions (Bendovschi, 2015). Firms in the retail sector that collect, store, analyze, and use big data to enhance decision-making processes need to use ICT systems that support the CIA. Organizations must design cybersecurity practices while considering risks associated with technology, such as cloud computing. Whereas it is difficult to decipher the intentions of all users, companies should not limit access to authorized users. It is imperative to ensure the availability of services for pleasant customer experience (Qadir&Quadri, 2016). Similarly, they ought to ensure the privacy and integrity of user data (Tchernykh, Schwiegelsohn, Talbi, &Babenko, 2019). Therefore, tools or software used to prevent attacks such as DDoS should not make it difficult for legitimate users to navigate the systems.

Overall, organizations that have embraced the use of ICT need to develop cybersecurity that will ensure the safety of vital user data. As more people and firms become dependent on information technology, entities must integrate systems that protect confidentiality, integrity, and foster data availability. Firms need to understand that the risks facing ICT systems will continue to increase as technology evolves. Therefore, they will need to adopt unique strategies to secure the data against internal and external threats. However, they ought to implement measures that will ensure ease of access to legit users, protect the integrity of the data and its availability for utilization.

References

Akinyede, R. O., &Esese, O. A. (2017). Development of a secure mobile e-banking system. International Journal of Computer (IJC), 26(1), 23-42. Retrieved from https://pdfs.semanticscholar.org/d4f0/42862dd948363fbfd5503bab3a6882f33136.pdf

Al-Shawabkeh, M., MM, S., & NHM, A. (2015). Computer security factors affect online usage of the internet banking system. ARPN Journal of Engineering and Applied Sciences, 10(2), 532-539. Retrieved from http://irep.iium.edu.my/42076/4/42076_Computer_security_factors_effects_towards_online_SCOPUS.pdf

Bendovschi, A. (2015). Cyber-attacks-trends, patterns, and security countermeasures. Procedia Economics and Finance, 28, 24-31. doi: 10.1016/s2212-5671(15)01077-1

Dube, S., Ndlovu, S., Nyathi, T., &Sibanda, K. (2015). QR code-based patient medical health records transmission: Zimbabwean case. In Proceedings of informing science & IT education conference (InSITE)

Nweke, L. O. (2017). Using the CIA and AAA models to explain cybersecurity activities. PM World Journal, vi (xii), 1-3. https://pmworldjournal.com/

Qadir, S., & Quadri, S. (2016). Information availability: An insight into the most important attribute of information security. Journal of Information Security, 07(03), 185-194. doi: 10.4236/jis.2016.73014

Tchernykh, A., Schwiegelsohn, U., Talbi, E., & Babenko, M. (2019). Towards understanding uncertainty in cloud computing with risks of confidentiality, integrity, and availability. Journal of Computational Science, 36, 100581. doi: 10.1016/j.jocs.2016.11.011

Treacy, C., &McCaffery, F. (2016). Data security overview for mobile medical apps assuring the confidentiality, integrity, and availability of data in transmission. International Journal on Advances in Security, 9(3 & 4), 146-157. Retrieved from http://www.iariajournals.org/security/

Cite this page

ICT Revolution: Benefits and Risks for Organizations - Essay Sample. (2023, Feb 27). Retrieved from https://proessays.net/essays/ict-revolution-benefits-and-risks-for-organizations-essay-sample

logo_disclaimer
Free essays can be submitted by anyone,

so we do not vouch for their quality

Want a quality guarantee?
Order from one of our vetted writers instead

If you are the original author of this essay and no longer wish to have it published on the ProEssays website, please click below to request its removal:

didn't find image

Liked this essay sample but need an original one?

Hire a professional with VAST experience and 25% off!

24/7 online support

NO plagiarism