Order For Similar Custom Papers & Assignment Help Services

Fill the order form details - writing instructions guides, and get your paper done.

Posted: December 1st, 2022

Information Technology Application Essay

Information Technology Application Essay
My interest in the area of Information Technology is to enhance my skills in Information Systems Security and Database Development and Management. I am interested in the two areas since they are essential in the current world. Huge companies such as Facebook have been exposed to security breaches that have tainted their name. My intention is to become a professional developer of secure databases and maintain them. It is also my aspiration to solve some of the security breaches in companies today. Companies are afraid that they will lose data to their rival companies if their sites are hacked (Kruse, Frederick, Jacobson & Monticone, 2017). It will desire to ensure I create security systems and safeguards to prevent hacking. I am also interested in this course to boost my knowledge and enhance my innovation to develop proactive solutions to curb cases of a security breach.
I am inspired to research in this area since the world is headed to a data-driven economy. Organizations will rely on data and computerized systems to enhance their competitiveness. Additionally, governments will need to safeguard the data of their citizens and their operations. Previously, prominent companies such as Yahoo have become victims of hacking and eventually losing data (Beaumont, 2018). Therefore, I am inspired to research this area to establish the various solutions that should be put in place to curb the loss of data. Various security walls have been developed before and they seem to be penetrable by hackers (Harris & Martin, 2019). My research will be based on the security systems that are already in place and their various weaknesses. I will seek to enhance the weakness. Additionally, I am inspired to research in this area to uncover information on how hackers penetrate a security wall. I will also focus on how organizations can detect hackers and block them permanently.
I believe it is important to research in this area since there are global hackers intending to access various sites without any permission. Their intention is to access websites, make them unavailable and ask for a ransom. For example, the British Airways site was hacked in 2018 making the online booking inactive. The incident led to a loss of customers and revenue. It ultimately affected over 380,000 customers. Therefore, I think it is important to support such companies with solutions to prevent dissatisfaction of their customers when they realize the systems are not working (Khidzir et al., 2016). Today, companies are relying heavily on online bookings such as tour and travel companies. I believe the development and maintenance of secure systems is their priority as they focus on dominating the global market through applications and websites. Therefore, they would like to secure their applications and websites.
I selected a Ph.D. in Information Technology since it has been my passion since I was a young person. I always loved to work with computers and explore their systems. Additionally, I desire to make my passion my career. Therefore, I have selected a Ph.D. in Information Technology since it wants to advance my skills in computers. Although I have some background in Information Technology, I believe I study more to enhance my skills and innovativeness. At the Ph.D. level, I will be involved in research and reviewing other scholarly work. The task will boost my skills and expand my knowledge on how to develop secure systems (Saini, Halgamuge, Sharma & Purkis, 2019). I will also work together with other like-minded scholars who will help me to remain focused on developing quality sites and applications. My role as a Ph.D. student in Information Technology will be to use my knowledge to help small companies in the locality to understand the security risks they face. I will also be involved in reading policies by the government and other institutions regarding the role of Information Technology.
I selected the University of Cumberlands since it has a great background in training solutions-oriented students for the current market. The private institution was founded in 1888 making it one of the oldest universities in the country. Over the years, it has developed systems of equipping their students with real training for the real world. Additionally, they have been involved in research on Information Technology topics such as data breach and data loss. The resources will boost my ability to become an icon in the business world (Conteh & Schmick, 2016). The institution has produced great world leaders in various fields such as Albert Robinson a politician, Ergun Caner an author, and Cat Zingano an artist. Therefore, the institution is known for developing world leaders in various fields. Therefore, I believe I will be inspired to leave a legacy in the field of information technology.
I have various strengths and weaknesses which I believe will work together to produce quality results. One of my strengths is collaborative skills. I love working in groups and collaborating with others to realize a common goal (Koltay, 2016). Over the years of working in groups, I have realized that groups have a better output compared to individual tasks. I am talented in software technical skills. The skills help me to remain passionate about the newest software or program. I am also gifted in persistence. When I have focused on a project or goal, I always ensure it is accomplished. I persist tenaciously to ensure that all the resources are acquired and the necessary human power is assembled to make a project successful (Toros, 2019). On the side of my weakness, I have difficulty asking questions or seeking help. I believe I can do every task on my own, but I am trying to overcome the challenge by working in groups. On the other hand, I am too critical of my personal work. I always evaluate the work I have done and sometimes I do not appreciate the major steps I have made.
The strengths and weaknesses will affect me as a Ph.D. student. First, the strengths will boost my ability to collaborate with other students to develop synergy. The synergy will be essential in developing information technology solutions suited for the current market (Koriakin et al., 2017). My software technical skills will help me to explore various systems, sites, and applications. My ability to persist will be crucial in developing new systems that can prevent current hackers from accessing sites. Secondly, my weakness in asking for help will provoke me to study extensively and be ahead of other students. However, I will try to work in groups to gain a broad understanding. I am also critical of my work. This weakness will affect the new ideas since I will question their effectiveness (Koriakin et al., 2017). However, it can help me to carry out a self-analysis of my progress. Therefore, the strengths and weaknesses will be useful in enhancing my education and practical programs.
The future of information technology is that more companies will realize the need for cybersecurity. They will thus install systems to prevent hackers from accessing their sites. New systems will be developed since the creativity of hackers is growing (Patrick & Fields, 2017). More companies are likely to invest more in artificial intelligence to curb hacking. The human intelligence will be used as a tool to detect cases of unusual visitors in a site and auto-resolve the problem. On the other hand, the future of information technology is that without proper investment in cybersecurity, companies will pay a huge price (Patrick & Fields, 2017). The reason is that attacks will increase the amount of data loss in the future.
I see myself working in large corporations to design and develop cybersecurity systems to enhance their security. My role will be to assess the problem and develop the necessary systems. Additionally, I visualize myself running a consultancy company to advise small and medium enterprises on how they can enhance their security. The firm will focus on identifying potential threats and prescribing the best solutions such as installing new software (Patrick & Fields, 2017). I also visualize myself working for government agencies and other huge corporations to develop preventive strategies to avoid data loss. It is also my vision to develop unique solutions that make computers and the systems therein safe and secure. The security systems involved will be focused on helping individual clients to realize the need for cybersecurity (Beaumont, 2018). Therefore, my work will be to work with both individual clients, the government and potential clients in various corporations.

References
Beaumont, P. (2018). Cybersecurity risks and automated maritime container terminals in the age of 4IR. In Handbook of Research on Information and Cyber Security in the Fourth Industrial Revolution, 497-516.
Conteh, N. Y., & Schmick, P. J. (2016). Cybersecurity: risks, vulnerabilities, and countermeasures to prevent social engineering attacks. International Journal of Advanced Computer Research, 6(23), 31.
Harris, M. A., & Martin, R. (2019). Promoting cybersecurity compliance. In Cybersecurity Education for Awareness and Compliance, 54-71.
Khidzir, N. Z., Ismail, A. R., Daud, K. A. M., Afendi, M. S., Ghani, A., & Ibrahim, M. A. H. (2016). Critical cybersecurity risk factors in digital social media: Analysis of information security requirements. Lecture Notes on Information Theory Vol, 4(1).
Koltay, T. (2016). Library and information science and digital humanities: perceived and real strengths and weaknesses. Journal of documentation, 72(4), 781-792.
Koriakin, T., White, E., Breaux, K. C., DeBiase, E., O’Brien, R., Howell, M., & Courville, T. (2017). Patterns of cognitive strengths and weaknesses and relationships to math errors. Journal of Psychoeducational Assessment, 35(1-2), 155-167.
Kruse, C. S., Frederick, B., Jacobson, T., & Monticone, D. K. (2017). Cybersecurity in healthcare: A systematic review of modern threats and trends. Technology and Health Care, 25(1), 1-10.
Patrick, H., & Fields, Z. (2017). A need for cybersecurity creativity. In Collective Creativity for Responsible and Sustainable Business Practice, 42-61.
Saini, G. K., Halgamuge, M. N., Sharma, P., & Purkis, J. S. (2019). A Review on cyber attacks: Security threats and solution techniques for different applications. In Secure Cyber-Physical Systems for Smart Cities, 183-219.
Toros, K. (2019). Undergraduate students’ perception of their own strengths and weaknesses as potential social workers. Journal of Social Work Practice, 33(1), 81-93.

Order | Check Discount

Tags: Help write my thesis paper, I need help writing my dissertation thesis, I need help writing my PhD dissertation, I paid someone to write my dissertation, Masters dissertation help

Assignment Help For You!

Special Offer! Get 20-25% Off On your Order!

Why choose us

You Want Quality and That’s What We Deliver

Top Skilled Writers

To ensure professionalism, we carefully curate our team by handpicking highly skilled writers and editors, each possessing specialized knowledge in distinct subject areas and a strong background in academic writing. This selection process guarantees that our writers are well-equipped to write on a variety of topics with expertise. Whether it's help writing an essay in nursing, medical, healthcare, management, psychology, and other related subjects, we have the right expert for you. Our diverse team 24/7 ensures that we can meet the specific needs of students across the various learning instututions.

Affordable Prices

The Essay Bishops 'write my paper' online service strives to provide the best writers at the most competitive rates—student-friendly cost, ensuring affordability without compromising on quality. We understand the financial constraints students face and aim to offer exceptional value. Our pricing is both fair and reasonable to college/university students in comparison to other paper writing services in the academic market. This commitment to affordability sets us apart and makes our services accessible to a wider range of students.

100% Plagiarism-Free

Minimal Similarity Index Score on our content. Rest assured, you'll never receive a product with any traces of plagiarism, AI, GenAI, or ChatGPT, as our team is dedicated to ensuring the highest standards of originality. We rigorously scan each final draft before it's sent to you, guaranteeing originality and maintaining our commitment to delivering plagiarism-free content. Your satisfaction and trust are our top priorities.

How it works

When you decide to place an order with Dissertation App, here is what happens:

Complete the Order Form

You will complete our order form, filling in all of the fields and giving us as much detail as possible.

Assignment of Writer

We analyze your order and match it with a writer who has the unique qualifications to complete it, and he begins from scratch.

Order in Production and Delivered

You and your writer communicate directly during the process, and, once you receive the final draft, you either approve it or ask for revisions.

Giving us Feedback (and other options)

We want to know how your experience went. You can read other clients’ testimonials too. And among many options, you can choose a favorite writer.