Information Technology IT Controls Term Paper

PAGES
3
WORDS
817
Cite

¶ … Controls In developing a new application that would replace an existing one, it is important that it should encompass all the existing functionalities of the old application that are of essential use to users. Technically, in terms of usability, the new system must meet all issues concerning the old application that caused its elimination. Moreover, the new application must be characterized by effectiveness, efficiency, accuracy, and better performance compared to the old one. In view of this, it is necessary that the development process of the new application must follow a rigid set of development rules, standards, set in detailed course of actions. Through this, it can be assured that the newly developed application or software product does not put the business into risk.

A set of development control and directives is necessary to ensure that all business control issues receive sufficient attention during the development process. As Rachelle Benson states in her Information Technology can Manage Routine Business Processes,

A well-designed and implemented system can run the routine side of the business 'like clockwork', managing processes and leaving managers and employees with more time to develop new business, find new customers and spend longer with existing customers.

Following are several...

...

Through this, the developers of the application can have an overview and idea on what approach they will take in the development process.
Gather all existing requirements of the old system that are still necessary and must exist in the new system

Anticipating the possibility that the system to be replaced is, in some way, still useful and effective to users is essential. This is especially true if the development process is meant to replace an old one. Through an analysis, review, and evaluation of the old application, the developers can have more idea on how they will make the new system better.

Gather all business issues in relation to the old system

After gathering business information, and analyzing the old application, knowing the business issues that exist in the old system is essential since they are the reasons why a new application will be developed and why the old one will be replaced. This process can provide the developer and the project team a list…

Sources Used in Documents:

Bibliography

Benson, R. (2004). Information Technology can Manage Routine Business Processes.

Retrieved on Feb 06, 2004, from Microsoft Bcentral.

Web site: http://www.bcentral.co.uk/admin/organise/StayingControl.asp

Application Development Process.
Web site: http://www.gsi-kc.com/applications/applicationdevelopmentprocess.html
http://www.gantthead.com/Gantthead/process/processMain/1,1289,2-19516-2,00.html


Cite this Document:

"Information Technology IT Controls" (2004, February 07) Retrieved April 19, 2024, from
https://www.paperdue.com/essay/information-technology-it-controls-161055

"Information Technology IT Controls" 07 February 2004. Web.19 April. 2024. <
https://www.paperdue.com/essay/information-technology-it-controls-161055>

"Information Technology IT Controls", 07 February 2004, Accessed.19 April. 2024,
https://www.paperdue.com/essay/information-technology-it-controls-161055

Related Documents

Network Security Management From the onset, it is important to note that for data to flow from one computer to another, such computers should be interconnected in what is referred to as a network. With such interconnectedness comes the risk of data interception and it is for this reason that network security is considered crucial. In the recent past, the number of corporations that have experienced attacks on their computing resources

Processing examples are conversion of encoded or typed words to printable format or running of computer programs such as the Statistical Package for Social Sciences (SPSS). Lastly, controlling ensures that all other four operations of the computer are efficiently working together, while at the same time, ensuring also that each operation does not interfere with the other operations. Examples of control measures in the computer are warnings or prompts

Information Technology Change Management in Home Health Care I hope enjoyed time holidays. Now back work . In team task week, a topic weekly focus debate paper labor unions change process. There sufficient information argue sides. Let . See: The labor union change process difficult employees management; I labor union make process a bit easier parties. Implementing Information Technology Change in a Health Care Facility There is a shift from the traditional institutionalized

Information Technology Acts What were the advances in information technology that resulted in new ethical issues necessitating the creation of each act? One of the common challenges that most regulations will face is keeping up with the changes in the technology. As the law, is designed to provide everyone with some kind of protection against potential abuse. However, improvements in technology have transformed the way that everyone is living their daily lives.

And this money is required to be raised from the market as the company does not generate this amount of revenue either from profits or from internal accruals. (DeHayes, 2003) 5. What should Tim do now? After taking into account all the known and understood pros and cons, there are some points on which Tim has to take action. These are (i) the manner in which to raise capital needed either

The need for continually creating and updating the security techniques and technologies involved in an enterprise system is the ethical responsibility of the IT professional. In order to successfully protect the information and intellectual property assets of a firm, an IT professional also needs to make a personal commitment to stay as current as possible on existing and future technologies (Pemberton, 1998). This commitment needs to be supported by the